Catalyst 4500 Series Switch Software Configuration Guide, Release IOS XE 3.4.xSG and IOS 15.1(2)SGx
Preface
Downloads: This chapterpdf (PDF - 166.0KB) The complete bookPDF (PDF - 19.02MB) | Feedback

Table of Contents

Preface

Audience

Organization

Conventions

Related Documentation

Hardware Documents

Software Documentation

Cisco IOS Documentation

Commands in Task Tables

Notices

OpenSSL/Open SSL Project

Obtaining Documentation and Submitting a Service Request

Preface

This preface describes who should read this document, how it is organized, and its conventions. The preface also tells you how to obtain Cisco documents, as well as how to obtain technical assistance.

Audience

This guide is for experienced network administrators who are responsible for configuring and maintaining Catalyst 4500 series switches.

Organization

This guide is organized into the following chapters:

 

Chapter
Title
Description

Chapter 1

Product Overview

Presents an overview of the Cisco IOS software for the Catalyst 4500 series switches.

Chapter 1

Command-Line Interfaces

Describes how to use the CLI.

Chapter 1

Configuring the Switch for the First Time

Describes how to perform a baseline configuration of the switch.

Chapter 1

Administering the Switch

Describes how to administer the switch.

Chapter 1

Configuring Virtual Switching Systems

Describes how to configure Virtual Switching Systems

Chapter 1

Configuring the Cisco IOS In-Service Software Upgrade Process

Describes how to configure the IOS ISSU process on the switch.

Chapter 1

Configuring the Cisco IOS XE In Service Software Upgrade Process

Describes how to configure the IOS XE ISSU process on the switch.

Chapter 1

Configuring Interfaces

Describes how to configure non-layer-specific features on Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet interfaces.

Chapter 1

Checking Port Status and Connectivity

Describes how to check module and interface status.

Chapter 1

Cisco TrustSec

Describes how to configure Cisco TrustSec.

Chapter 10

Configuring Supervisor Engine Redundancy Using RPR and SSO on Supervisor Engine 6-E and Supervisor Engine 6L-E

Describes how to configure RPR and SSO on Supervisor Engines 6-E and 6L-E.

Chapter 12

Configuring Supervisor Engine Redundancy Using RPR and SSO on Supervisor Engine 7-E and Supervisor Engine 7L-E

Describes how to configure RPR and SSO on Supervisor Engines 7-E and 7L-E.

Chapter 13

Configuring Cisco NSF with SSO Supervisor Engine Redundancy

Describes how to configure supervisor engine redundancy using Cisco nonstop forwarding (NSF) with stateful switchover (SSO).

Chapter 14

Environmental Monitoring and Power Management

Describes how to configure power management and environmental monitoring features.

Chapter 1

Configuring Power over Ethernet

Describes how to configure Power over Ethernet (PoE).

Chapter 1

Configuring the Catalyst 4500 Series Switch with Cisco Network Assistant

Describes how to install and configure Network Assistant and Embedded CiscoView.

Chapter 1

Configuring VLANs, VTP, and VMPS

Describes how to configure VLANs, VTP, and VMPS.

Chapter 1

Configuring IP Unnumbered Interface

Describes how to configure IP Unnumbered support.

Chapter 1

Configuring Layer 2 Ethernet Interfaces

Describes how to configure interfaces to support Layer 2 features, including VLAN trunks.

Chapter 1

Configuring SmartPort Macros

Describes how to configure SmartPort macros.

Chapter 1

Configuring Cisco IOS Auto Smartport Macros

Describes how to configure Auto SmartPort Macros

Chapter 1

Configuring STP and MST

Describes how to configure the Spanning Tree Protocol (STP) and the Multiple Spanning Tree (MST) protocol and explains how they work.

Chapter 1

Configuring Flex Links and MAC Address-Table Move Update

Describes how to how to configure Flex Links on a switch.

Chapter 1

Configuring Resilient Ethernet Protocol

Describes how to configure Resilient Ethernet Protocol (REP).

Chapter 1

Configuring Optional STP Features

Describes how to configure the spanning-tree PortFast, UplinkFast, BackboneFast, and other STP features

Chapter 1

Configuring EtherChannel and Link State Tracking

Describes how to configure Layer 2 and Layer 3 EtherChannel port bundles.

Chapter 1

Configuring IGMP Snooping and Filtering

Describes how to configure Internet Group Management Protocol (IGMP) snooping.

Chapter 1

Configuring IPv6 MLD Snooping

Describes how to configure IPv6 MLD Snooping.

Chapter 1

Configuring 802.1Q Tunneling, VLAN Mapping, and Layer 2 Protocol Tunneling

Describes how to configure 802.1Q and Layer 2 protocol Tunneling.

Chapter 1

Configuring CDP

Describes how to configure the Cisco Discovery Protocol (CDP).

Chapter 1

Configuring LLDP, LLDP-MED, and Location Service

Describes how to configure Link Layer Discovery Protocol (LLDP).

Chapter 1

Configuring UDLD

Describes how to configure the UniDirectional Link Detection (UDLD) protocol.

Chapter 1

Configuring Unidirectional Ethernet

Describes how to configure Unidirectional Ethernet

Chapter 1

Configuring Layer 3 Interfaces

Describes how to configure interfaces to support Layer 3 features.

Chapter 1

Configuring Cisco Express Forwarding

Describes how to configure Cisco Express Forwarding (CEF) for IP unicast traffic.

Chapter 36

Configuring Unicast Reverse Path Forwarding

Describes how to configure Unicast Reverse Path Forwarding.

Chapter 1

Configuring IP Multicast

Describes how to configure IP Multicast Multilayer Switching (MMLS).

Chapter 1

Configuring ANCP Client

Describes how to configure ANCP.

Chapter 1

Configuring Bidirection Forwarding Detection

Describes how to configure Bidirectional Forwarding Detection

Chapter 40

Configuring Policy-Based Routing

Describes how to configure policy-based routing.

Chapter 1

Configuring VRF-lite

Describes how to configure multiple VPN routing/forwarding (multi-VRF) instances in customer edge (CE) devices.

Chapter 42

Configuring Quality of Service

Describes how to configure quality of service (QoS).

Chapter 1

Configuring Voice Interfaces

Describes how to configure voice interfaces.

Chapter 44

Configuring Private VLANs

Describes how to set up and modify private VLANs.

Chapter 45

Configuring MACsec Encryption

Describes how to configure MACsec encryption.

Chapter 1

Configuring 802.1X Port-Based Authentication

Describes how to conf.igure 802.1X port-based authentication.

Chapter 1

Configuring the PPPoE Intermediate Agent

Describes how to configure PPPoE Intermediate Agent.

Chapter 1

Configuring Web-Based Authentication

Describes how to configure web-based authentication.

Chapter 1

Configuring Port Security

Describes how to configure port security and trunk port security.

Chapter 1

Configuring Control Plane Policing and Layer 2 Control Packet QoS

Describes how to protect your Catalyst 4500 series switch using control plane policing (CoPP).

Chapter 1

Configuring Dynamic ARP Inspection

Describes how to configure Dynamic ARP Inspection.

Chapter 1

Configuring DHCP Snooping, IP Source Guard, and IPSG for Static Hosts

Describes how to configure DHCP snooping and IP Source Guard.

Chapter 1

Configuring Network Security with ACLs

Describes how to configure ACLS, VACLs, and MACLs.

Chapter 1

Support for IPv6

Describes the support for IPv6 on the switch.

Chapter 1

Port Unicast and Multicast Flood Blocking

Describes how to configure unicast flood blocking.

Chapter 1

Configuring Storm Control

Describes how to configure storm control suppression.

Chapter 1

Configuring SPAN and RSPAN

Describes how to configure the Switched Port Analyzer (SPAN).

Chapter 1

Configuring Wireshark

Describes how to configure Wireshark, the Ethernet Analyzer on the Catalyst 4500 series switch.

Chapter 1

Configuring Enhanced Object Tracking

Describres how to configure Enhanced Object Tracking

Chapter 1

Configuring System Message Logging

Describes how to configure system message logging.

Chapter 1

Onboard Failure Logging (OBFL)

Describes how to enable OBFL.

Chapter 1

Configuring SNMP

Describes how to configure the Simple Network Management Protocol (SNMP).

Chapter 1

Configuring NetFlow-lite

Describes how to configure NetFlow-lite.

Chapter 1

Configuring Flexible NetFlow

Describes how to configure Flexible NetFlow,

Chapter 1

Configuring Ethernet OAM and CFM

Describes how to configure Ethernet OAM and CFM.

Chapter 1

Configuring Y.1731 (AIS and RDI)

Describes how to configure Y.1731.

Chapter 1

Configuring Call Home

Describes how to configure Call Home.

Chapter 1

Configuring Cisco IOS IP SLA Operations

Describes how to configure Cisco IOS IP SLA operations.

Chapter 1

Configuring RMON

Describes how to configure Remote Network Monitoring (RMON).

Chapter 1

Performing Diagnostics

Describes various types of diagnostics on the Catalyst 4500 series switch.

Chapter 1

Configuring WCCP Version 2 Services

Describes how to configure the Catalyst 4500 series switches to redirect traffic to cache engines (web caches) using the Web Cache Communication Protocol (WCCP), and describes how to manage cache engine clusters (cache farms).

Chapter 1

Configuring MIB Support

Describes how to configure SNMP and MIB support.

Chapter 1

ROM Monitor

Describes the ROM Monitor.

Appendix A

Acronyms and Abbreviations

Defines acronyms and abbreviations used in this book.

Conventions

This document uses the following typographical conventions:

 

Convention
Description

boldface font

Commands, command options, and keywords are in boldface .

italic font

Command arguments for which you supply values are in italics .

[ ]

Command elements in square brackets are optional.

{ x | y | z }

Alternative keywords in command lines are grouped in braces and separated by vertical bars.

[ x | y | z ]

Optional alternative keywords are grouped in brackets and separated by vertical bars.

string

A unquoted set of characters. Do not use quotation marks around the string because the string will include the quotation marks.

screen font

System displays are in screen font.

boldface screen font

Information you must enter verbatim is in boldface screen font.

italic screen font

Arguments for which you supply values are in italic screen font.

 

This pointer highlights an important line of text in an example.

^

Represents the key labeled Control—for example, the key combination ^D in a screen display means hold down the Control key while you press the D key.

< >

Nonprinting characters such as passwords are in angle brackets.

Notes use the following conventions:


Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.


Cautions use the following conventions:


Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Related Documentation

Refer to the following documents for additional Catalyst 4500 series information:

  • Catalyst 4500 Series Switch Documentation Home

http://www.cisco.com/en/US/products/hw/switches/ps4324/tsd_products_support_series_home.htmll

  • Catalyst 4900 Series Switch Documentation Home

http://www.cisco.com/en/US/products/ps6021/index.html

Hardware Documents

Installation guides and notes including specifications and relevant safety information are available at the following URLs:

  • Catalyst 4500 Series Switches Installation Guide

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html

  • Catalyst 4500 E-series Switches Installation Guide

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html

  • For information about individual switching modules and supervisors, refer to the Catalyst 4500 Series Module Installation Guide at:

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/configuration/notes/OL_25315.html

  • Regulatory Compliance and Safety Information for the Catalyst 4500 Series Switches

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html

  • Installation notes for specific supervisor engines or for accessory hardware are available at:

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html

  • Catalyst 4900 and 4900M hardware installation information is available at:

http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html

  • Catalyst 4500-X hardware installation information is available at:

http://www.cisco.com/en/US/products/ps12332/prod_installation_guides_list.html

Software Documentation

Software release notes, configuration guides, command references, and system message guides are available at the following URLs:

  • Cisco 4500-X release notes are available at:

http://www.cisco.com/en/US/products/ps12332/prod_release_notes_list.html

  • Catalyst 4500E release notes are available at:

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html

  • Catalyst 4500 release notes are available at:

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html

  • Catalyst 4900 release notes are available at:

http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html

Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900 Series, and Catalyst 4500-X Series switches are available at the following URLs:

  • Catalyst 4500 Series Software Configuration Guide

http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html

  • Catalyst 4500 Series Software Command Reference

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html

  • Catalyst 4500 Series Software System Message Guide

http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html

Cisco IOS Documentation

Platform- independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:

  • Cisco IOS configuration guides, Release 12.x

http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html

  • Cisco IOS command references, Release 12.x

http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html

You can also use the Command Lookup Tool at:

http://tools.cisco.com/Support/CLILookup/cltSearchAction.do

  • Cisco IOS system messages, version 12.x

http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html

You can also use the Error Message Decoder tool at:

http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi

Commands in Task Tables

Commands listed in task tables show only the relevant information for completing the task and not all available options for the command. For a complete description of a command, refer to the command in the Catalyst 4500 Series Switch Cisco IOS Command Reference.

Notices

The following notices pertain to this software license.

OpenSSL/Open SSL Project

This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/ ).

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).

This product includes software written by Tim Hudson (tjh@cryptsoft.com).

License Issues

The OpenSSL toolkit stays under a dual license; that is, both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.

OpenSSL License:

Copyright © 1998-2007 The OpenSSL Project. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/ )”.

4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.

5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.

6. Redistributions of any form whatsoever must retain the following acknowledgment:

“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/ )”.

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).

Original SSLeay License:

Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.

This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).

The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgement:

“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.

The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.

4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The license and distribution terms for any publicly available version or derivative of this code cannot be changed, that is, this code cannot be copied and put under another distribution license [including the GNU Public License].

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation , which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.