Numerics -
A -
B -
C -
D -
E -
F -
G -
H -
I -
J -
K -
L -
M -
N -
O -
P -
Q -
R -
S -
T -
U -
V -
W -
Index
Numerics
10/100 autonegotiation feature, forced 6-8
10-Gigabit Ethernet port
deploy with Gigabit Ethernet SFP ports 6-6
802.10 SAID (default) 13-4
802.1Q
trunks 17-6
tunneling
compatibility with other features 21-5
defaults 21-4
described 21-2
tunnel ports with other features 21-6
802.1Q VLANs
encapsulation 15-3
trunk restrictions 15-5
802.1s
See MST
802.1w
See MST
802.1X
See port-based authentication
802.1X authentication
for Critical Authentication 32-12
for guest VLANs 32-8
for MAC Authentication Bypass 32-9
for Wake-on-LAN 32-12
RADIUS accounting 32-16
with port security 32-15
with VLAN assignment 32-7
with voice VLAN ports 32-19
802.3ad
See LACP
A
AAA 34-1
abbreviating commands 2-5
access control entries
See ACEs
access control entries and lists 34-1
access list filtering, SPAN enhancement 41-13
access lists
using with WCCP 47-7
access ports
and Layer 2 protocol tunneling 21-9
configure port security 33-6, 33-21
configuring 15-8
access VLANs 15-6
accounting
configuring for 802.1X 32-32
with TACACS+ 3-16, 3-21
ACEs
ACLs 37-2
Ethernet 37-2
IP 37-2
Layer 4 operation restrictions 37-9
ACEs and ACLs 34-1
ACLs
ACEs 37-2
and SPAN 41-5
and TCAM programming 37-6
applying on routed packets 37-22
applying on switched packets 37-21
compatibility on the same switch 37-3
configuring with VLAN maps 37-21
CPU impact 37-11
hardware and software support 37-5
IP, matching criteria for port ACLs 37-4
MAC extended 37-12
matching criteria for router ACLs 37-3
port
and voice VLAN 37-4
defined 37-3
limitations 37-4
processing 37-11
resize the TCAM regions 37-8
troubleshooting 49-4
types supported 37-2
acronyms, list of A-1
active queue management 30-14
adding members to a community 12-8
addresses
displaying the MAC address table 4-30
dynamic
changing the aging time 4-21
defined 4-19
learning 4-20
removing 4-22
MAC, discovering 4-30
See MAC addresses
static
adding and removing 4-27
defined 4-19
address resolution 4-30
adjacency tables
description 26-2
displaying statistics 26-9
advertisements, VTP
See VTP advertisements
aging time
MAC address table 4-21
alarms
major 10-2
minor 10-2
ARP
defined 4-30
table
address resolution 4-30
managing 4-30
asymmetrical links, and 802.1Q tunneling 21-4
audience xxix
authentication
NTP associations 4-4
See also port-based authentication
TACACS+
defined 3-16
key 3-18
login 3-19
Authentication, Authorization, and Accounting (AAA) 34-1
Authentication Failed VLAN assignment
configure with 802.1X 32-39
authentication server
defined 32-3
RADIUS server 32-3
authoritative time source, described 4-2
authorization
with TACACS+ 3-16, 3-21
authorized and unauthorized ports 32-4
authorized ports with 802.1X 32-4
autoconfiguration 3-2
automatic discovery
considerations 12-6
automatic QoS
See QoS
Auto-MDIX on a port
configuring 6-17
displaying the configuration 6-17
overview 6-16
autonegotiation feature
forced 10/100Mbps 6-8
Auto-QoS
configuring 30-17
Autostate
understanding 25-5
auto-sync command 8-7
B
BackboneFast
adding a switch (figure) 18-3
and MST 17-23
configuring 18-15
link failure (figure) 18-13, 18-14
not supported MST 17-23
understanding 18-12
See also STP
banners
configuring
login 4-19
message-of-the-day login 4-18
default configuration 4-18
when displayed 4-17
b command 50-3
b flash command 50-3
BGP 1-7
routing session with multi-VRF CE 29-6
blocking packets 39-1
blocking state (STP)
RSTP comparisons (table) 17-24
boot bootldr command 3-31
boot command 3-27
boot commands 50-3
boot fields
See configuration register boot fields
bootstrap program
See ROM monitor
boot system command 3-26, 3-31
boot system flash command 3-28
Border Gateway Protocol
See BGP
boundary ports
description 17-27
BPDU Guard
and MST 17-23
configuring 18-15
overview 18-7
BPDUs
and media speed 17-2
pseudobridges and 17-25
what they contain 17-3
bridge ID
See STP bridge ID
bridge priority (STP) 17-16
bridge protocol data units
See BPDUs
broadcast storm control
disabling 40-4
BSR
configuration example 27-21
burst rate 30-57
burst size 30-31
C
cache engine clusters xxxi, 47-1
cache engines xxxi, 47-1
cache farms
See cache engine clusters
candidates
automatic discovery 12-6
candidate switch, cluster
defined 12-12
requirements 12-12
cautions for passwords
encrypting 3-22
CDP
and trusted boundary 30-26
automatic discovery in communities 12-6
configuration 22-2
displaying configuration 22-3
enabling on interfaces 22-3
Layer 2 protocol tunneling 21-7
maintaining 22-3
monitoring 22-3
overview 1-2, 22-1
cdp enable command 22-3
CEF
adjacency tables 26-2
and NSF with SSO 9-5
configuring load balancing 26-7
displaying statistics 26-8
enabling 26-6
hardware switching 26-4
load balancing 26-6
overview 26-1
software switching 26-4
CGMP
overview 20-1
channel-group group command 19-7, 19-10
Cisco 7600 series Internet router
enabling SNMP 48-16
Cisco Discovery Protocol
See CDP
Cisco Express Forwarding
See CEF
Cisco Group Management Protocol
See CGMP
Cisco IOS NSF-aware
support 9-2
Cisco IOS NSF-capable support 9-2
Cisco IP Phones
configuring 31-2
sound quality 31-1
CiscoWorks 2000 43-4
CIST
description 17-22
class-map command 30-33
class of service
See CoS
clear cdp counters command 22-4
clear cdp table command 22-3
clear counters command 6-20
clearing
IP multicast table entries 27-20
clear ip eigrp neighbors command 25-13
clear ip flow stats command 44-9
CLI
accessing 2-1
backing out one level 2-5
getting commands 2-5
history substitution 2-3
managing clusters 12-12
modes 2-5
monitoring environments 41-1
ROM monitor 2-7
software basics 2-4
clients
in 802.1X authentication 32-2
clock
See system clock
clustering switches
command switch characteristics 12-11, 12-12
and VTY 12-11
convert to a community 12-9
managing
through CLI 12-12
overview 12-10
planning considerations
CLI 12-12
passwords 12-7
command-line processing 2-3
command modes 2-5
commands
b 50-3
b flash 50-3
boot 50-3
confreg 50-3
dev 50-3
dir device 50-3
frame 50-5
i 50-3
listing 2-5
meminfo 50-5
reset 50-3
ROM monitor50-2to 50-3
ROM monitor debugging 50-5
SNMP 48-16
sysret 50-5
command switch, cluster
requirements 12-11
common and internal spanning tree
See CIST
common spanning tree
See CST
community of switches
access modes in Network Assistant 12-8
adding devices 12-8
candidate characterisitcs 12-6
communication protocols 12-8
community name 12-7
configuration information 12-8
converting from a cluster 12-9
host name 12-7
passwords 12-7
community ports 38-4
community strings
configuring 43-7
overview 43-4
community VLANs 38-3, 38-4
and SPAN features 38-11
configure as a PVLAN 38-13
compiling MIBs 48-16
config-register command 3-28
config terminal command 3-9
configurable leave timer,IGMP 20-3
configuration examples
SNMP 43-16
configuration files
limiting TFTP server access 43-15
obtaining with DHCP 3-6
saving 3-10
system contact and location information 43-15
configuration guidelines
SNMP 43-6
configuration register
boot fields
listing value 3-29
modifying 3-28
changing from ROM monitor 50-3
changing settings3-28to 3-29
configuring 3-26
settings at startup 3-27
configure Layer 3 interfaces
physical 25-6
configure terminal command 3-28, 6-2
confreg command 50-3
console configuration mode 2-5
console download50-4to 50-5
console port
disconnecting user sessions 7-6
monitoring user sessions 7-6
control plane policing
See CoPP
CoPP
applying QoS service policy to control plane 34-3
configuring
ACLs to match traffic 34-3
enabling MLS QoS 34-3
packet classification criteria 34-3
service-policy map 34-3
control plane configuration mode
entering 34-3
displaying
dynamic information 34-7
number of conforming bytes and packets 34-7
rate information 34-7
entering control plane configuration mode 34-3
monitoring statistics 34-7
overview 34-1
copy running-config startup-config command 3-10
copy system:running-config nvram:startup-config command 3-31
CoS
configuring port value 30-53
definition 30-3
figure 30-2
overriding on Cisco IP Phones 31-4
priority 31-4
CoS Mutation
configuring 30-41
CoS-to-DSCP maps 30-58
counters
clearing MFIB 27-20
clearing on interfaces 6-19
CPU hogs, identifying or displaying 49-1
CPU port sniffing 41-10
Critical Authentication
configure with 802.1X 32-36
CST
description 17-25
IST and 17-22
MST and 17-22
customer edge devices 29-2
D
daylight saving time 4-13
debug commands, ROM monitor 50-5
default configuration
802.1X 32-22
auto-QoS 30-17
banners 4-18
DNS 4-16
IGMP filtering 20-18
Layer 2 protocol tunneling 21-9
MAC address table 4-21
multi-VRF CE 29-3
NTP 4-4
private VLANs 38-10
RMON 45-3
SNMP 43-6
SPAN and RSPAN 41-6
system message logging 42-4
system name and prompt 4-15
TACACS+ 3-18
default gateway
configuring 3-11
verifying configuration 3-11
default settings, erase commad 3-31
deploying 10-Gigabit Ethernet and a Gigabit Ethernet SFP ports 6-6
description command 6-10
detecting unidirectional links 23-1
dev command 50-3
DHCP-based autoconfiguration
client request message exchange 3-3
configuring
client side 3-2
DNS 3-5
relay device 3-5
server-side 3-4
TFTP server 3-4
example 3-7
lease options
for IP address information 3-4
for receiving the configuration file 3-4
overview 3-2
relationship to BOOTP 3-3
DHCP snooping
configuring 35-3
default configuration 35-3
displaying binding tables 35-10
displaying configuration 35-11
enabling 35-4
enabling on private VLAN 35-6
enabling the database agent 35-6
monitoring 35-10, 35-14
overview 35-1
Snooping database agent 35-2
DHCP Snooping Database Agent
adding to the database (example) 35-9
enabling (example) 35-7
overview 35-2
reading from a TFTP file (example) 35-8
Diagnostics
online 46-1
troubleshooting 46-2
Power-On-Self-Test
causes of failure 46-13
how it works 46-3
overview 46-3
Power-On-Self-Test for Supervisor Engine V-10GE 46-7
Differentiated Services Code Point values
See DSCP values
DiffServ architecture, QoS 30-2
Digital optical monitoring transceiver support 6-7
dir device command 50-3
disabled state
RSTP comparisons (table) 17-24
disabling
broadcast storm control 40-4
disconnect command 7-6
discovery, clusters
See automatic discovery
DNS
and DHCP-based autoconfiguration 3-5
default configuration 4-16
displaying the configuration 4-17
overview 4-15
setting up 4-16
documentation
organization xxix
related xxxii
domain names
DNS 4-15
Domain Name System
See DNS
double-tagged packets
802.1Q tunneling 21-2
Layer 2 protocol tunneling 21-9
downloading MIBs 48-14, 48-15
drop threshold for Layer 2 protocol packets 21-10
DSCP maps 30-58
DSCP-to-CoS maps
configuring 30-60
DSCP values
configuring maps 30-58
configuring port value 30-54
definition 30-4
IP precedence 30-2
mapping markdown 30-24
mapping to transmit queues 30-55
DTP
VLAN trunks and 15-3
duplex command 6-9
duplex mode
configuring interface 6-8
dynamic ARP inspection
ARP cache poisoning 36-2
configuring
ACLs for non-DHCP environments 36-10
in DHCP environments 36-5
log buffer 36-14
rate limit for incoming ARP packets 36-16
denial-of-service attacks, preventing 36-16
interface trust state, security coverage 36-3
log buffer
configuring 36-14
logging of dropped packets 36-4
overview 36-1
port channels, their behavior 36-4
priority of static bindings 36-4
purpose of 36-2
rate limiting of ARP packets 36-4
configuring 36-16
validation checks, performing 36-19
dynamic buffer limiting
globally 30-27
on specific CoS values 30-29
on specific IP DSCP values 30-28
Dynamic Host Configuration Protocol snooping
See DHCP snooping
dynamic port VLAN membership
example 13-26
limit on hosts 13-25
reconfirming 13-23
troubleshooting 13-25
Dynamic Trunking Protocol
See DTP
E
EAP frames
changing retransmission time 32-44
exchanging (figure) 32-4, 32-6, 32-11
request/identity 32-3
response/identity 32-3
setting retransmission number 32-45
EAPOL frames
802.1X authentication and 32-3
OTP authentication, example (figure) 32-4, 32-11
start 32-3
edge ports
description 17-27
EGP
overview 1-7
EIGRP (Enhanced IGRP)
stub routing
benefits 25-12
configuration tasks 25-13
configuring 25-9
overview 25-9
restrictions 25-12
verifying 25-13
EIGRP (enhanced IGRP)
overview 1-7
eigrp stub command 25-13
Embedded CiscoView
displaying information 4-34
installing and configuring 4-31
overview 4-31
enable command 3-9, 3-28
enable mode 2-5
enabling SNMP 48-16
encapsulation types 15-3
Enhanced Interior Gateway Routing Protocol
See EIGRP
environmental monitoring
LED indications 10-2
SNMP traps 10-2
supervisor engine 10-2
switching modules 10-2
using CLI commands 10-1
EtherChannel
channel-group group command 19-7, 19-10
configuration guidelines 19-5
configuring19-6to 19-14
configuring Layer 2 19-9
configuring Layer 3 19-6
interface port-channel command 19-7
lacp system-priority
command example 19-12
modes 19-3
overview 19-1
PAgP
Understanding 19-3
physical interface configuration 19-7
port-channel interfaces 19-2
port-channel load-balance command 19-12
removing 19-14
removing interfaces 19-13
explicit host tracking
enabling 20-10
extended range VLANs
See VLANs
Extensible Authentication Protocol over LAN 32-1
Exterior Gateway Protocol
See EGP
F
FastDrop
clearing entries 27-20
displaying entries 27-19
overview 27-10
FIB
description 26-2
See also MFIB
filtering
in a VLAN 37-14
non-IP traffic 37-12
flags 27-11
Flash memory
configuring router to boot from 3-30
loading system images from 3-30
security precautions 3-30
flooded traffic, blocking 39-2
flow control, configuring 6-11
forward-delay time (STP)
configuring 17-18
forwarding information base
See FIB
frame command 50-5
G
gateway
See default gateway
get-bulk-request operation 43-3
get-next-request operation 43-3, 43-4
get-request operation 43-3, 43-4
get-response operation 43-3
Gigabit Ethernet SFP ports
deploy with 10-Gigabit Ethernet 6-6
global configuration mode 2-5
Guest-VLANs
configure with 802.1X 32-32, 32-41
H
hardware and software ACL support 37-5
hardware switching 26-5
hello time (STP)
configuring 17-17
high CPU, troubleshooting 49-3
history
CLI 2-3
history table, level and number of syslog messages 42-10
hop counts
configuring MST bridges 17-28
host
configuring host statically 20-10
limit on dynamic port 13-25
host ports
kinds of 38-4
Hot Standby Routing Protocol
See HSRP
HSRP
description 1-6
http
//www.cisco.com/en/US/products/ps6350/products_configuration_guide_chapter09186a008042fbb3.html 1-6
//www.cisco.com/univercd/cc/td/doc/product/software/ios124/124tcr/tcf_r/index.htm 22-1
hw-module module num power command 10-17
I
ICMP
enabling 7-11
ping 7-7
running IP traceroute 7-8
time exceeded messages 7-8
i command 50-3
identifying CPU hogs 49-1
IDS
using with SPAN and RSPAN 41-2
IEEE 802.1s
See MST
IEEE 802.1w
See MST
IEEE 802.3ad
See LACP
IGMP
configurable leave timer
enabling 20-8
configurable-leave timer 20-3
description 27-3
enabling 27-13
explicit host tracking 20-4, 20-10
immediate-leave processing 20-3
overview 20-1
IGMP filtering
configuring 20-18
default configuration 20-18
described 20-18
monitoring 20-21
IGMP groups
setting the maximum number 20-20
IGMP Immediate Leave
configuration guidelines 20-8
IGMP profile
applying 20-19
configuration mode 20-18
configuring 20-19
IGMP snooping
configuration guidelines 20-4
enabling 20-5, 20-6
IP multicast and 27-4
monitoring 20-13
overview 20-1
IGRP
description 1-8
immediate-leave processing
enabling 20-8
IGMP
See fast-leave processing
ingress packets, SPAN enhancement 41-12
inline power
configuring on Cisco IP phones 31-5
insufficient inline power handling for Supervisor Engine II-TS 10-15
Intelligent Power Management 11-4
interface command 3-9, 6-1
interface port-channel command 19-7
interface range command 6-4
interface range macro command 6-5
interfaces
adding descriptive name 6-10
clearing counters 6-19
configuring 6-2
configuring ranges 6-4
displaying information about 6-19
Layer 2 modes 15-4
maintaining 6-19
monitoring 6-19
naming 6-10
numbers 6-2
overview 6-1
restarting 6-20
See also Layer 2 interfaces
Interior Gateway Routing Protocol
See IGRP
Internet Control Message Protocol
See ICMP
Internet Group Management Protocol
See IGMP
Inter-Switch Link encapsulation
See ISL encapsulation
Intrusion Detection System
See IDS
IP
configuring default gateway 3-11
configuring static routes 3-11
displaying statistics 26-8
flow switching cache 44-9
IP addresses
cluster candidate or member 12-12
cluster command switch 12-11
discovering 4-30
ip cef command 26-6
IP Enhanced IGRP
interfaces, displaying 25-14
ip flow-aggregation cache destination-prefix command 44-11
ip flow-aggregation cache prefix command 44-11
ip flow-aggregation cache source-prefix command 44-12
ip flow-export command 44-9
ip icmp rate-limit unreachable command 7-12
ip igmp profile command 20-18
ip igmp snooping tcn flood command 20-12
ip igmp snooping tcn flood query count command 20-12
ip igmp snooping tcn query solicit command 20-13
IP information
assigned
through DHCP-based autoconfiguration 3-2
ip load-sharing per-destination command 26-7
ip local policy route-map command 28-5
ip mask-reply command 7-13
IP multicast
clearing table entries 27-20
configuring 27-12
default configuration 27-13
displaying PIM information 27-15
displaying the routing table information 27-16
enabling 27-13
enabling dense-mode PIM 27-14
enabling sparse-mode 27-14
features not supported 27-12
hardware forwarding 27-8
IGMP snooping and 20-4, 27-4
monitoring 27-15
overview 27-1
routing protocols 27-2
software forwarding 27-8
troubleshooting 49-17, 49-18
See also Auto-RP; IGMP; PIM; RP; RPF
ip multicast-routing command 27-13
IP phones
automatic classification and queueing 30-17
configuring voice ports 31-3
See Cisco IP Phones 31-1
trusted boundary for QoS 30-26
ip pim command 27-14
ip pim dense-mode command 27-14
ip pim sparse-dense-mode command 27-15
ip policy route-map command 28-4
IP Port Security for Static Hosts
on a Layer 2 access port 35-16
on a PVLAN host port 35-19
overview 35-15
ip redirects command 7-12
ip route-cache flow command 44-7
IP routing tables
deleting entries 27-20
IP Source Guard
configuring 35-12
configuring on private VLANs 35-13
displaying 35-13, 35-14
overview 35-11
IP statistics
displaying 26-8
IP traceroute
executing 7-8
overview 7-8
IP unicast
displaying statistics 26-8
troubleshooting 49-27
IP Unnumbered support
configuring on a range of Ethernet VLANs 14-5
configuring on LAN and VLAN interfaces 14-4
configuring with connected host polling 14-6
DHCP Option 82 14-2
displaying settings 14-7
format of agent remote ID suboptions 14-3
troubleshooting 14-8
with conected host polling 14-3
with DHCP server and Relay agent 14-2
ip unreachables command 7-11
IPX
redistribution of route information with EIGRP 1-7
ISL
encapsulation 15-3
trunking with 802.1Q tunneling 21-4
isolated port 38-4
isolated VLANs 38-3, 38-4
ISSU
compatibility matrix 5-12
compatiblity verification using Cisco Feature Navigator 5-13
NSF overview 5-3
perform the process
aborting a software upgrade 5-25
configuring the rollback timer as a safeguard 5-26
displaying a compatibility matrix 5-27
loading the new software on the new standby 5-23
stopping the rollback timer 5-22
switching to the standby 5-19
verify the ISSU state 5-16
verify the redundancy mode 5-15
verify the software installation 5-14
vload the new software on standby 5-16
prerequisites 5-2
process overview 5-6
restrictions 5-2
SNMP support 5-13
SSO overview 5-3
troubleshooting 49-10
versioning capability in software to support 5-11
IST
and MST regions 17-22
description 17-22
master 17-27
J
jumbo frames
and ethernet ports 6-14
configuring MTU sizes for 6-15
ports and linecards that support 6-13
VLAN interfaces 6-14
K
keyboard shortcuts 2-3
L
l2protocol-tunnel command 21-11
labels, definition 30-3
LACP
system ID 19-4
Layer 2 access ports 15-8
Layer 2 frames
classification with CoS 30-2
Layer 2 interfaces
assigning VLANs 13-8
configuring 15-5
configuring as PVLAN host ports 38-16
configuring as PVLAN promiscuous ports 38-15
configuring as PVLAN trunk ports 38-17
defaults 15-5
disabling configuration 15-9
modes 15-4
show interfaces command 15-7
Layer 2 interface type
resetting 38-21
setting 38-21
Layer 2 protocol tunneling
default configuration 21-9
guidelines 21-10
Layer 2 switching
overview 15-1
Layer 2 Traceroute
and ARP 7-10
and CDP 7-9
host-to-host paths 7-9
IP addresses and subnets 7-10
MAC addresses and VLANs 7-10
multicast traffic 7-10
multiple devices on a port 7-10
unicast traffic 1-19, 7-9
usage guidelines 7-9
Layer 2 trunks
configuring 15-6
overview 15-3
Layer 3 interfaces
configuration guidelines 25-3
EIGRP stub routing 25-8
logical VLAN 25-3
overview 25-1
logical 25-2
physical 25-2
VLANs as interfaces 25-4
Layer 3 packets
classification methods 30-2
Layer 4 port operations
configuration guidelines 37-10
restrictions 37-9
LEDs
description (table) 10-2
listening state (STP)
RSTP comparisons (table) 17-24
load balancing
configuring for CEF 26-7
configuring for EtherChannel 19-12
overview 19-4, 26-6
per-destination 26-7
login authentication
with TACACS+ 3-19
login banners 4-17
login timer
changing 7-5
log messages
See system message logging
logoutwarning command 7-6
loop guard
and MST 17-23
configuring 18-4
overview 18-3
M
MAC addresses
aging time 4-21
allocating 17-5
and VLAN association 4-20
building tables 4-20, 15-2
convert dynamic to sticky secure 33-5
default configuration 4-21
discovering 4-30
displaying 4-30, 7-3
displaying in DHCP snooping binding table 35-11
dynamic
learning 4-20
removing 4-22
in ACLs 37-12
static
adding 4-28
allowing 4-29
characteristics of 4-27
dropping 4-29
removing 4-28
sticky 33-4
sticky secure, adding 33-5
MAC Authentication Bypass
configure with 802.1X 32-35
MAC extended access lists 37-12
macros
See Smartports macros
main-cpu command 8-7
management options
SNMP 43-1
mapping
DSCP markdown values 30-24
DSCP values to transmit queues 30-55
mapping tables
configuring DSCP 30-58
described 30-14
mask destination command 44-11
mask source command 44-11, 44-12
Match CoS for non-IPV4 traffic
configuring 30-35
match ip address command 28-3
maximum aging time (STP)
configuring 17-18
MDA
configuration guidelines 32-20
described 32-19
members
automatic discovery 12-6
member switch
managing 12-12
member switch, cluster
defined 12-11
requirements 12-12
meminfo command 50-5
messages, to users through banners 4-17
metro tags 21-2
MFIB
CEF 27-5
displaying 27-18
overview 27-11
MIBs
compiling 48-16
downloading 48-14, 48-15
overview 43-1
related information 48-15
SNMP interaction with 43-4
modules
checking status 7-1
powering down 10-17
monitoring
802.1Q tunneling 21-12
ACL information 37-29
IGMP filters 20-21
IGMP snooping 20-13
Layer 2 protocol tunneling 21-12
multi-VRF CE 29-11
private VLANs 49-37
traffic flowing among switches 45-1
tunneling 21-12
VLAN filters 37-20
VLAN maps 37-20
M-record 17-23
MST
and multiple spanning trees 1-3, 17-22
boundary ports 17-27
BPDUs 17-23
configuration parameters 17-26
configuring 17-29
displaying configurations 17-34
edge ports 17-27
enabling 17-29
hop count 17-28
instances
configuring parameters 17-33
description 17-22
number supported 17-26
interoperability with PVST+ 17-23
link type 17-28
master 17-27
message age 17-28
regions 17-26
restrictions 17-29
to-SST interoperability 17-24
MSTP
M-record 17-23
M-tree 17-23
M-tree 17-23
MTU size
configuring 6-15, 6-21, 6-22
default 13-4
multicast
See IP multicast
multicast packets
blocking 39-2
multicast routers
displaying routing tables 27-16
flood suppression 20-10
Multicast Storm Control
overview 40-6
suppression on WS-X4014 40-7
suppression on WS-X4016 40-6
multidomain authentication
See MDA
Multiple Domain Authentication
configuring 32-28
overview of Host Mode 32-6
multiple forwarding paths 1-3, 17-22
Multiple Spanning Tree
See MST
multiple VPN routing/forwarding
See multi-VRF CE
multi-VRF CE
components 29-3
configuration example 29-7
default configuration 29-3
defined 29-1
displaying 29-11
monitoring 29-11
network components 29-3
packet-forwarding process 29-3
N
named aggregate policers, creating 30-30
native VLAN
and 802.1Q tunneling 21-4
specifying 15-6
NetFlow
aggregation
minimum mask,default value 44-11
destination-prefix aggregation
configuration (example) 44-16
minimum mask, configuring 44-11
IP
flow switching cache 44-9
prefix aggregation
configuration (example) 44-14
minimum mask, configuring 44-11
source-prefix aggregation
minimum mask, configuring 44-11
switching
checking for required hardware 44-6
configuration (example) 44-13
configuring switched IP flows 44-8
enabling Collection 44-7
exporting cache entries 44-9
statistics 44-9
NetFlow statistics
caveats on supervisor 44-6
checking for required hardware 44-6
configuring collection 44-6
enabling Collection 44-7
exporting cache entries 44-9
overview of collection 44-1
switched/bridged IP flows 44-8
Network Assistant
and VTY 12-11
configure
enable communication with switch 12-13, 12-17
default configuration 12-2
overview of CLI commands 12-2
network fault tolerance 1-3, 17-22
network management
configuring 22-1
RMON 45-1
SNMP 43-1
Network Time Protocol
See NTP
New Software Features in Release 7.7
TDR 7-3
Next Hop Resolution Protocol
See NHRP
NFFC/NFFC II
IGMP snooping and 20-4
NHRP
support 1-8
non-IP traffic filtering 37-12
non-RPF traffic
description 27-9
in redundant configurations (figure) 27-10
Nonstop Forwarding
See NSF
nonvolatile random-access memory
See NVRAM
normal-range VLANs
See VLANs
NSF
defined 9-1
guidelines and restrictions 9-9
operation 9-5
NSF-aware
supervisor engines 9-3
support 9-2
NSF-capable
supervisor engines 9-3
support 9-2
NSF with SSO supervisor engine redundancy
and CEF 9-5
overview 9-4
SSO operation 9-4
NTP
associations
authenticating 4-4
defined 4-2
enabling broadcast messages 4-7
peer 4-6
server 4-6
default configuration 4-4
displaying the configuration 4-11
overview 4-2
restricting access
creating an access group 4-9
disabling NTP services per interface 4-10
source IP address, configuring 4-10
stratum 4-2
synchronizing devices 4-6
time
services 4-2
synchronizing 4-2
NVRAM
saving settings 3-10
O
OIR
overview 6-18
Online Diagnostics 46-1
online insertion and removal
See OIR
Open Shortest Path First
See OSPF
operating system images
See system images
OSPF
area concept 1-8
description 1-8
P
packets
modifying 30-16
software processed
and QoS 30-16
packet type filtering
overview 41-15
SPAN enhancement 41-15
PAgP
understanding 19-3
passwords
configuring enable password 3-14
configuring enable secret password 3-14
encrypting 3-22
in clusters 12-7
recovering lost enable password 3-24
setting line password 3-14
PBR (policy-based routing)
configuration (example) 28-5
enabling 28-3
features 28-2
overview 28-1
route maps 28-2
when to use 28-2
PeerResetReason environmental variable
tracking supervisor engine resets 49-2
per-port and VLAN Access Control List 35-11
per-port per-VLAN QoS
enabling 30-48
overview 30-16
Per-VLAN Rapid Spanning Tree 17-6
enabling 17-20
overview 17-6
PE to CE routing, configuring 29-6
PIM
configuring dense mode 27-14
configuring sparse mode 27-14
displaying information 27-15
displaying statistics 27-20
enabling sparse-dense mode 27-14, 27-15
overview 27-3
PIM-DM 27-3
PIM-SM 27-3
ping
executing 7-7
overview 7-7
ping command 7-7, 27-15
PoE 11-8
configuring power consumption for single device 11-5
configuring power consumption for switch 11-5
power consumption for powered devices
Intelligent Power Management 11-4
overview 11-4
supported cabling topology 11-6
powering down a module 10-17
power management modes 11-2
show interface status 11-7
point-to-point
in 802.1X authentication (figure) 32-2, 32-17
police command 30-37
policed-DSCP map 30-59
policers
description 30-5
types of 30-10
policies
See QoS policies
policing
See QoS policing
policy-map command 30-33, 30-36
policy maps
attaching to interfaces 30-40
configuring 30-35
port ACLs
and voice VLAN 37-4
defined 37-3
limitations 37-4
Port Aggregation Protocol
see PAgP
port-based authentication
802.1X with voice VLAN 32-19
changing the quiet period 32-44
client, defined 32-2
configuration guidelines 32-23
configure 802.1X accounting 32-32
configure switch-to-RADIUS server communication 32-26
configure with Authentication Failed VLAN assignment 32-39
configure with Critical Authentication 32-36
configure with Guest-VLANs 32-32, 32-41
configure with MAC Authentication Bypass 32-35
configure with Wake-on-LAN 32-38
configuring
Multiple Domain Authentication 32-28
configuring Guest-VLAN 32-26
configuring manual re-authentication of a client 32-47
controlling authorization state 32-4
default configuration 32-22
described 32-1
device roles 32-2
displaying statistics 32-48
enabling 32-23
enabling multiple hosts 32-43
enabling periodic re-authentication 32-42
encapsulation 32-3
host mode 32-6
initiation and message exchange 32-3
method lists 32-23
multidomain authentication 32-19
multiple-hosts mode, described 32-6
port security
multiple-hosts mode 32-7
ports not supported 32-4
resetting to default values 32-47
setting retransmission number 32-45
setting retransmission time 32-44
topologies, supported 32-21
using with port security 32-15
with Critical Authentication 32-12
with Guest VLANs 32-8
with MAC Authentication Bypass 32-9
with VLAN assignment 32-7
port-based QoS features
See QoS
port-channel interfaces
See also EtherChannel
creating 19-6
overview 19-2
port-channel load-balance
command 19-12
command example 19-12
port-channel load-balance command 19-12
port cost (STP)
configuring 17-15
PortFast
and MST 17-23
BPDU filter, configuring 18-8
configuring or enabling 18-15
overview 18-5
PortFast BPDU filtering
and MST 17-23
enabling 18-8
overview 18-8
port priority
configuring MST instances 17-33
configuring STP 17-13
ports
blocking 39-1
checking status 7-2
dynamic VLAN membership
example 13-26
reconfirming 13-23
forwarding, resuming 39-3
See also interfaces
port security
aging 33-5
and QoS trusted boundary 30-26
configuring 33-7
displaying 33-26
guidelines and restrictions 33-31
on access ports 33-6, 33-21
on private VLAN 33-13
host 33-14
over Layer 2 EtherChannel 33-31
promiscuous 33-15
topology 33-14, 33-17, 33-31
on trunk port 33-16
guidelines and restrictions 33-14, 33-17, 33-20, 33-31
port mode changes 33-21
on voice ports 33-21
RADIUS accounting 32-16
sticky learning 33-5
troubleshooting
common system error messages 49-35
verifying that an address is secure 49-34
using with 802.1X 32-15
violations 33-5
with 802.1X Authentication 33-30
with DHCP and IP Source Guard 33-30
with other features 33-31
port states
description 17-5
port trust state
See trust states
power
inline 31-5
power dc input command 10-14
power handling for Supervisor Engine II-TS 11-12
power inline command 11-3
power inline consumption command 11-5
power management
Catalyst 4500 series 10-3
Catalyst 4500 Series power supplies 10-9
Catalyst 4948 series 10-17
combined mode 10-5
configuring combined mode 10-8
configuring redundant mode 10-7
overview 10-1
redundancy 10-3
redundant mode 10-5
Power-On-Self-Test diagnostics 46-3, 46-13
Power-On-Self-Test for Supervisor Engine V-10GE 46-7
power redundancy-mode command 10-8
power supplies
fixed 10-4
variable 10-4, 10-17
primary VLANs 38-2, 38-4
associating with secondary VLANs 38-14
configuring as a PVLAN 38-13
priority
overriding CoS of incoming frames 31-4
private VLAN
configure port security 33-14
private VLANs
across multiple switches 38-5
and SVIs 38-9
benefits of 38-2
community ports 38-4
community VLANs 38-3, 38-4
default configuration 38-10
end station access to 38-3
isolated port 38-4
isolated VLANs 38-3, 38-4
monitoring 49-37
ports
community 38-4
isolated 38-4
promiscuous 38-5
primary VLANs 38-2, 38-4
promiscuous ports 38-5
secondary VLANs 38-3
subdomains 38-2
traffic in 38-8
troubleshooting
common system error messages 49-38
verifying that an address is secure 49-38
privileged EXEC mode 2-5
privileges
changing default 3-23
configuring levels 3-23
exiting 3-24
logging in 3-23
promiscuous ports
configuring PVLAN 38-15
defined 38-5
setting mode 38-21
protocol timers 17-4
provider edge devices 29-2
pruning, VTP
See VTP pruning
pseudobridges
description 17-25
PVACL 35-11
PVID (port VLAN ID)
and 802.1X with voice VLAN ports 32-19
PVLAN promiscuous trunk port
configuring 38-2, 38-15, 38-19
PVLANs
802.1q support 38-12
across multiple switches 38-5
configuration guidelines 38-10
configure port security 33-13, 33-15, 33-17
configure port security in a wireless setting 33-31
configure port security over Layer 2 EtherChannel 33-31
configuring 38-9
configuring a VLAN 38-13
configuring promiscuous ports 38-15
host ports
configuring a Layer 2 interface 38-16
setting 38-21
overview 38-1
permitting routing, example 38-20
promiscuous mode
setting 38-21
setting
interface mode 38-21
Q
QoS
allocating bandwidth 30-56
and software processed packets 30-16
auto-QoS
configuration and defaults display 30-20
configuration guidelines 30-19
described 30-17
displaying 30-20
effects on NVRAM configuration 30-19
enabling for VoIP 30-19
basic model 30-5
burst size 30-31
classification30-6to 30-10
configuration guidelines 30-25
auto-QoS 30-19
configuring
auto-QoS 30-17
DSCP maps 30-58
dynamic buffer limiting 30-27
traffic shaping 30-57
trusted boundary 30-26
VLAN-based 30-52
configuring UBRL 30-42
creating named aggregate policers 30-30
creating policing rules 30-32
default auto configuration 30-17
default configuration 30-23
definitions 30-3
disabling on interfaces 30-40
enabling and disabling 30-51
enabling on interfaces 30-40
enabling per-port per-VLAN 30-48
flowcharts 30-8, 30-12
IP phones
automatic classification and queueing 30-17
detection and trusted settings 30-17, 30-26
overview 30-1
overview of per-port per-VLAN 30-16
packet modification 30-16
port-based 30-52
priority 30-15
traffic shaping 30-16
transmit rate 30-57
trust states
trusted device 30-26
VLAN-based 30-52
See also COS; DSCP values; transmit queues
QoS active queue management
tracking queue length 30-14
QoS labels
definition 30-3
QoS mapping tables
CoS-to-DSCP 30-58
DSCP-to-CoS 30-60
policed-DSCP 30-59
types 30-14
QoS marking
description 30-5
QoS policers
burst size 30-31
types of 30-10
QoS policing
definition 30-5
described 30-5, 30-10
QoS policy
attaching to interfaces 30-11
overview of configuration 30-33
QoS transmit queues
allocating bandwidth 30-56
burst 30-16
configuring 30-55
configuring traffic shaping 30-57
mapping DHCP values to 30-55
maximum rate 30-16
overview 30-14
sharing link bandwidth 30-15
Quality of service
See QoS
queueing 30-5, 30-14
R
RADIUS server
configure to-Switch communication 32-26
configuring settings 32-28
parameters on the switch 32-26
range command 6-4
range macros
defining 6-5
ranges of interfaces
configuring 6-4
Rapid Spanning Tree
See RSTP
rcommand command 12-12
re-authentication of a client
configuring manual 32-47
enabling periodic 32-42
reduced MAC address 17-2
redundancy
configuring 8-7
guidelines and restrictions 8-5
changes made through SNMP 8-11
NSF-aware support 9-2
NSF-capable support 9-2
overview 8-2
redundancy command 8-7
understanding synchronization 8-4
redundancy (NSF) 9-1
configuring
BGP 9-11
CEF 9-11
EIGRP 9-16
IS-IS 9-14
OSPF 9-13
routing protocols 9-5
redundancy (RPR)
route processor redundancy 8-3
synchronization 8-5
redundancy (SSO)
redundancy command 9-10
route processor redundancy 8-3
synchronization 8-5
related documentation xxxii
reload command 3-28, 3-29
Remote Network Monitoring
See RMON
replication
description 27-8
reserved-range VLANs
See VLANs
reset command 50-3
resetting a switch to defaults 3-31
restricting access
NTP services 4-8
TACACS+ 3-15
retransmission number
setting in 802.1X authentication 32-45
retransmission time
changing in 802.1X authentication 32-44
RFC
1157, SNMPv1 43-2
1305, NTP 4-2
1757, RMON 45-2
1901, SNMPv2C 43-2
1902 to 1907, SNMPv2 43-2
2273-2275, SNMPv3 43-2
RIP
description 1-9
RMON
default configuration 45-3
displaying status 45-7
enabling alarms and events 45-4
groups supported 45-2
overview 45-1
ROM monitor
boot process and 3-25
CLI 2-7
commands50-2to 50-3
debug commands 50-5
entering 50-2
exiting 50-6
overview 50-1
root bridge
configuring 17-9
selecting in MST 17-22
root guard
and MST 17-23
enabling 18-2
overview 18-2
routed packets
ACLs 37-22
route-map (IP) command 28-3
route maps
defining 28-3
PBR 28-2
router ACLs
description 37-3
using with VLAN maps 37-21
route targets
VPN 29-3
Routing Information Protocol
See RIP
RSPAN
configuration guidelines 41-16
destination ports 41-5
IDS 41-2
monitored ports 41-4
monitoring ports 41-5
received traffic 41-3
sessions
creating 41-17
defined 41-3
limiting source traffic to specific VLANs 41-23
monitoring VLANs 41-22
removing source (monitored) ports 41-21
specifying monitored ports 41-17
source ports 41-4
transmitted traffic 41-4
VLAN-based 41-5
RSTP
compatibility 17-23
description 17-22
port roles 17-23
port states 17-24
S
SAID
See 802.10 SAID
scheduling 30-14
defined 30-5
overview 30-6
secondary root switch 17-12
secondary VLANs 38-3
associating with primary 38-14
permitting routing 38-20
security
configuring 34-1
Security Association Identifier
See 802.10 SAID
sequence numbers in log messages 42-8
servers, VTP
See VTP servers
service-policy command 30-33
service-policy input command 24-2, 30-40
service-provider networks
and customer VLANs 21-2
set default interface command 28-4
set interface command 28-4
set ip default next-hop command 28-4
set ip next-hop command 28-4
set-request operation 43-4
severity levels, defining in system messages 42-9
sharing adjacencies
troubleshooting 49-29
show adjacency command 26-9
show boot command 3-31
show catalyst4000 chassis-mac-address command 17-3
show cdp command 22-2, 22-3
show cdp entry command 22-4
show cdp interface command 22-3
show cdp neighbors command 22-4
show cdp traffic command 22-4
show ciscoview package command 4-34
show ciscoview version command 4-34
show cluster members command 12-12
show configuration command 6-10
show debugging command 22-4
show environment command 10-2
show history command 2-4
show interfaces command 6-15, 6-19, 6-21, 6-22
show interfaces status command 7-2
show ip cache flow aggregation destination-prefix command 44-12
show ip cache flow aggregation prefix command 44-12
show ip cache flow aggregation source-prefix command 44-12
show ip cache flow command 44-9
show ip cef command 26-8
show ip eigrp interfaces command 25-14
show ip eigrp neighbors command 25-14
show ip eigrp topology command 25-14
show ip eigrp traffic command 25-14
show ip interface command 27-15
show ip local policy command 28-5
show ip mroute command 27-15
show ip pim interface command 27-15
show l2protocol command 21-12
show mac-address-table address command 7-3
show mac-address-table interface command 7-3
show mls entry command 26-8
show module command 7-1, 17-5
show PoE consumed 11-8
show power inline command 11-7
show power inline consumption command 11-5
show power supplies command 10-8
show protocols command 6-19
show running-config command
adding description for an interface 6-10
checking your settings 3-9
displaying ACLs 37-15, 37-17, 37-24, 37-25
show startup-config command 3-10
show users command 7-6
show version command 3-28, 3-29
shutdown, command 6-20
shutdown threshold for Layer 2 protocol packets 21-9
shutting down
interfaces 6-20
Simple Network Management Protocol
See SNMP
single spanning tree
See SST
slot numbers, description 6-2
Smartports macros
applying global parameter values 16-8
applying macros 16-8
applying parameter values 16-8
configuration guidelines 16-6
configuring 16-2
creating 16-7
default configuration 16-3
defined 16-1
displaying 16-13
tracing 16-6
website 16-2
SNMP
accessing MIB variables with 43-4
agent
described 43-4
disabling 43-7
authentication level 43-10
community strings
configuring 43-7
overview 43-4
configuration examples 43-16
configuration guidelines 43-6
default configuration 43-6
enabling 48-16
engine ID 43-6
groups 43-6, 43-9
host 43-6
informs
and trap keyword 43-11
described 43-5
differences from traps 43-5
enabling 43-14
limiting access by TFTP servers 43-15
limiting system log messages to NMS 42-10
manager functions 43-3
notifications 43-5
overview 43-1, 43-4
status, displaying 43-17
system contact and location 43-15
trap manager, configuring 43-13
traps
described 43-3, 43-5
differences from informs 43-5
enabling 43-11
enabling MAC address notification 4-22
enabling MAC move notification 4-24
enabling MAC threshold notification 4-26
overview 43-1, 43-4
types of 43-11
users 43-6, 43-9
versions supported 43-2
SNMP commands 48-16
SNMPv1 43-2
SNMPv2C 43-2
SNMPv3 43-2
software
upgrading 8-13
software configuration register 3-26
software switching
description 26-5
interfaces 26-6
key data structures used 27-7
SPAN
and ACLs 41-5
configuration guidelines 41-7
configuring41-6to 41-10
destination ports 41-5
IDS 41-2
monitored port, defined 41-4
monitoring port, defined 41-5
received traffic 41-3
sessions
defined 41-3
source ports 41-4
transmitted traffic 41-4
VLAN-based 41-5
SPAN and RSPAN
concepts and terminology 41-3
default configuration 41-6
displaying status 41-25
overview 41-1
session limits 41-6
SPAN enhancements
access list filtering 41-13
configuration example 41-15
CPU port sniffing 41-10
encapsulation configuration 41-12
ingress packets 41-12
packet type filtering 41-15
spanning-tree backbonefast command 18-15
spanning-tree cost command 17-15
spanning-tree guard root command 18-2
spanning-tree portfast bpdu-guard command 18-7
spanning-tree portfast command 18-6
spanning-tree port-priority command 17-13
spanning-tree uplinkfast command 18-11
spanning-tree vlan
command 17-9
command example 17-9
spanning-tree vlan command 17-8
spanning-tree vlan cost command 17-15
spanning-tree vlan forward-time command 17-19
spanning-tree vlan hello-time command 17-17
spanning-tree vlan max-age command 17-18
spanning-tree vlan port-priority command 17-13
spanning-tree vlan priority command 17-17
spanning-tree vlan root primary command 17-10
spanning-tree vlan root secondary command 17-12
speed
configuring interface 6-8
speed command 6-8
SSO
configuring 9-10
SSO operation 9-4
SST
description 17-22
interoperability 17-24
stack changes, effects on
system message log 42-2
stacks, switch
system messages
hostnames in the display 42-1
remotely monitoring 42-2
static addresses
See addresses
static routes
configuring 3-11
verifying 3-12
statistics
displaying 802.1X 32-48
displaying PIM 27-20
NetFlow accounting 44-9
SNMP input and output 43-17
sticky learning
configuration file 33-5
defined 33-5
disabling 33-5
enabling 33-5
saving addresses 33-5
sticky MAC addresses
configuring 33-7
defined 33-4
Storm Control
disabling 40-4
displaying 40-5
enabling 40-3
hardware-based, implementing 40-2
overview 40-1
STP
bridge ID 17-2
configuring17-7to 17-20
creating topology 17-4
defaults 17-6
disabling 17-19
enabling 17-7
enabling extended system ID 17-8
enabling Per-VLAN Rapid Spanning Tree 17-20
forward-delay time 17-18
hello time 17-17
Layer 2 protocol tunneling 21-7
maximum aging time 17-18
overview 17-1, 17-3
per-VLAN rapid spanning tree 17-6
port cost 17-15
port priority 17-13
root bridge 17-9
stratum, NTP 4-2
stub routing (EIGRP)
benefits 25-12
configuration examples 25-14
configuration tasks 25-13
configuring 25-9
monitoring and maintaining 25-13
overview 25-8, 25-9
restrictions 25-12
verifying 25-13
subdomains, private VLAN 38-2
summer time 4-13
supervisor engine
accessing the redundant 8-14
configuring3-8to 3-13
copying files to standby 8-14
default configuration 3-1
default gateways 3-11
environmental monitoring 10-1
redundancy 9-1
ROM monitor 3-25
startup configuration 3-25
static routes 3-11
synchronizing configurations 8-11
Supervisor Engine II-TS
insufficient inline power handling 10-15, 11-12
SVI Autostate Exclude
troubleshooting 49-39
SVI Autostate exclude
configuring 25-5
SVIs
and router ACLs 37-3
switched packets
and ACLs 37-21
Switched Port Analyzer
See SPAN
switching, NetFlow
checking for required hardware 44-6
configuration (example) 44-13
configuring switched IP flows 44-8
enabling Collection 44-7
exporting cache entries 44-9
switchport
show interfaces 6-15, 6-21, 6-22
switchport access vlan command 15-6, 15-8
switchport block multicast command 39-2
switchport block unicast command 39-2
switchport mode access command 15-8
switchport mode dot1q-tunnel command 21-6
switchport mode dynamic command 15-6
switchport mode trunk command 15-6
switch ports
See access ports
switchport trunk allowed vlan command 15-6
switchport trunk encapsulation command 15-6
switchport trunk encapsulation dot1q command 15-3
switchport trunk encapsulation isl command 15-3
switchport trunk encapsulation negotiate command 15-3
switchport trunk native vlan command 15-6
switchport trunk pruning vlan command 15-6
switch-to-RADIUS server communication
configuring 32-26
syslog
See system message logging
syslog messages 10-2
sysret command 50-5
system
reviewing configuration 3-10
settings at startup 3-27
system clock
configuring
daylight saving time 4-13
manually 4-11
summer time 4-13
time zones 4-12
displaying the time and date 4-12
overview 4-2
See also NTP
system images
loading from Flash memory 3-30
modifying boot field 3-27
specifying 3-29
system message logging
default configuration 42-4
defining error message severity levels 42-9
disabling 42-5
displaying the configuration 42-13
enabling 42-5
facility keywords, described 42-13
level keywords, described 42-10
limiting messages 42-10
message format 42-2
overview 42-1
sequence numbers, enabling and disabling 42-8
setting the display destination device 42-5
stack changes, effects of 42-2
synchronizing log messages 42-6
timestamps, enabling and disabling 42-8
UNIX syslog servers
configuring the daemon 42-11
configuring the logging facility 42-12
facilities supported 42-13
system MTU
802.1Q tunneling 21-5
maximums 21-5
system name
default configuration 4-15
default setting 4-15
manual configuration 4-15
See also DNS
system prompt, default setting 4-14, 4-15
T
TACACS+ 34-1
accounting, defined 3-16
authentication, defined 3-16
authorization, defined 3-16
configuring
accounting 3-21
authentication key 3-18
authorization 3-21
login authentication 3-19
default configuration 3-18
displaying the configuration 3-22
identifying the server 3-18
limiting the services to the user 3-21
operation of 3-17
overview 3-15
tracking services accessed by user 3-21
tagged packets
802.1Q 21-3
Layer 2 protocol 21-7
TCAM programming and ACLs 37-6, 37-8
TCAMs, troubleshooting 49-41
TDR
checking cable connectivity 7-3
enabling and disabling test 7-3
guidelines 7-3
Telnet
accessing CLI 2-2
disconnecting user sessions 7-6
executing 7-5
monitoring user sessions 7-6
telnet command 7-5
Terminal Access Controller Access Control System Plus
See TACACS+
TFTP
configuration files in base directory 3-5
configuring for autoconfiguration 3-4
limiting access by servers 43-15
TFTP download
See also console download
time
See NTP and system clock
Time Domain Reflectometer
See TDR
time exceeded messages 7-8
timer
See login timer
timestamps in log messages 42-8
time zones 4-12
Token Ring
media not supported (note) 13-4, 13-10
TOS
description 30-4
trace command 7-9
traceroute
See IP traceroute
See Layer 2 Traceroute
traceroute mac command 7-10
traceroute mac ip command 7-10
traffic
blocking flooded 39-2
traffic control
using ACLs (figure) 37-4
using VLAN maps (figure) 37-5
traffic shaping 30-16
translational bridge numbers (defaults) 13-4
transmit queues
See QoS transmit queues
transmit rate 30-57
traps
configuring MAC address notification 4-22
configuring MAC move notification 4-24
configuring MAC threshold notification 4-26
configuring managers 43-11
defined 43-3
enabling 4-22, 4-24, 4-26, 43-11
notification types 43-11
overview 43-1, 43-4
troublehsooting
ISSU 49-10
troubleshootiing
port security 49-34
troubleshooting
ACLs 49-4
high CPU 49-3
identifying CPU hogs 49-1
IP multicast
overview 49-17
PIM and IGMP protocols 49-17
topology and configuration 49-18
IP unicast 49-27
sharing adjacencies 49-29
verifying a router's MAC address 49-33
PVLANs 49-37
SVI Autostate Exclude 49-39
TCAMs 49-41
ACL optimization 49-7
Layer 4 operators 49-8
static 49-9
structure of the input and output CAMs 49-6
tracking supervisor resets through PeerResetReason variable 49-2
with CiscoWorks 43-4
with system message logging 42-1
with traceroute 7-8
trunk ports
configure port security 33-16
configuring PVLAN38-17to 38-18
trunks
802.1Q restrictions 15-5
configuring 15-6
configuring access VLANs 15-6
configuring allowed VLANs 15-6
default interface configuration 15-6
different VTP domains 15-3
enabling to non-DTP device 15-4
encapsulation 15-3
specifying native VLAN 15-6
understanding 15-3
trusted boundary for QoS 30-26
trust states
configuring 30-53
tunneling
defined 21-1
tunnel ports
802.1Q, configuring 21-6
described 21-2
incompatibilities with other features 21-5
type of service
See TOS
U
UDLD
default configuration 23-2
disabling 23-3
enabling 23-3
overview 23-1
unauthorized ports with 802.1X 32-4
unicast
See IP unicast
unicast flood blocking
configuring 39-1
unicast MAC address filtering
and adding static addresses 4-29
and broadcast MAC addresses 4-28
and CPU packets 4-28
and multicast addresses 4-28
and router MAC addresses 4-28
configuration guidelines 4-28
described 4-28
unicast traffic
blocking 39-2
unidirectional ethernet
enabling 24-2
example of setting 24-2
overview 24-1
UniDirectional Link Detection Protocol
See UDLD
UNIX syslog servers
daemon configuration 42-11
facilities supported 42-13
message logging configuration 42-12
UplinkFast
and MST 17-23
enabling 18-15
MST and 17-23
overview 18-10
User Based Rate Limiting
configuring 30-43
overview 30-42
user EXEC mode 2-5
user sessions
disconnecting 7-6
monitoring 7-6
V
VACLs
Layer 4 port operations 37-9
virtual configuration register 50-3
virtual LANs
See VLANs
Virtual Private Network
See VPN
VLAN ACLs
See VLAN maps
vlan command 13-6, 13-7
vlan database command 13-7
vlan dot1q tag native command 21-4
VLAN ID, discovering 4-30
VLAN Management Policy Server
See VMPS
VLAN maps
applying 37-17, 37-25
common uses for 37-18
configuration example 37-18
configuration guidelines 37-14
configuring 37-13
creating entries 37-15
defined 37-3
denying access example 37-19
denying packets 37-15
displaying 37-20
examples 37-19
order of entries 37-14
permitting packets 37-15
router ACLs and 37-21
using (figure) 37-5
VLANs
allowed on trunk 15-6
configuration guidelines 13-3
configuring 13-4
customer numbering in service-provider networks 21-3
default configuration 13-4
description 1-5
extended range 13-3
IDs (default) 13-4
interface assignment 13-8
limiting source traffic with RSPAN 41-23
monitoring with RSPAN 41-22
name (default) 13-4
normal range 13-3
overview 13-1
reserved range 13-3
See also PVLANs
VLAN Trunking Protocol
See VTP
VLAN trunks
overview 15-3
VMPS
configuration file example 13-29
configuring dynamic access ports on client 13-22
configuring retry interval 13-24
database configuration file 13-29
dynamic port membership
example 13-26
reconfirming 13-23
reconfirming assignments 13-23
reconfirming membership interval 13-23
server overview 13-17
VMPS client
administering and monitoring 13-24
configure switch
configure reconfirmation interval 13-23
dynamic ports 13-22
entering IP VMPS address 13-21
reconfirmation interval 13-24
reconfirm VLAM membership 13-23
default configuration 13-21
dynamic VLAN membership overview 13-20
troubleshooting dynamic port VLAN membership 13-25
VMPS server
fall-back VLAN 13-19
illegal VMPS client requests 13-20
overview 13-17
security modes
multiple 13-19
open 13-18
secure 13-19
voice interfaces
configuring 31-1
Voice over IP
configuring 31-1
voice ports
configuring VVID 31-3
voice traffic 11-2, 31-5
voice VLAN
IP phone data traffic, described 31-2
IP phone voice traffic, described 31-2
voice VLAN ports
using 802.1X 32-19
VPN
configuring routing in 29-5
forwarding 29-3
in service provider networks 29-1
routes 29-2
routing and forwarding table
See VRF
VRF
defining 29-3
tables 29-1
VTP
configuration guidelines 13-12
configuring13-13to 13-17
configuring transparent mode 13-16
default configuration 13-12
disabling 13-16
Layer 2 protocol tunneling 21-7
monitoring 13-16
overview 13-8
See also VTP version 2
VTP advertisements
description 13-9
VTP clients
configuring 13-15
VTP domains
description 13-9
VTP modes 13-9
VTP pruning
enabling 13-13
overview 13-10
VTP servers
configuring 13-14
VTP statistics
displaying 13-16
VTP version 2
enabling 13-14
overview 13-10
See also VTP
VTY and Network Assistant 12-11
VVID (voice VLAN ID)
and 802.1X authentication 32-19
configuring 31-3
W
Wake-on-LAN
configure with 802.1X 32-38
WCCP
configuration examples 47-8
configuring on a router 47-2, 47-10
features 47-4
restrictions 47-5
service groups 47-6
Web Cache Communication Protocol
See WCCP xxxi, 47-1
web caches
See cache engines
web cache services
description 47-4
web caching
See web cache services
See also WCCP
web scaling 47-1