- Preface
- Product Overview
- Configuring the Router for the First Time
- Configuring a Supervisor Engine 720
- Configuring a Route Switch Processor 720
- Configuring NSF with SSO Supervisor Engine Redundancy
- ISSU and eFSU on Cisco 7600 Series Routers
- Configuring RPR and RPR+ Supervisor Engine Redundancy
- Configuring Interfaces
- Configuring a Supervisor Engine 32
- Configuring LAN Ports for Layer 2 Switching
- Configuring Flex Links
- Configuring EtherChannels
- Configuring VTP
- Configuring VLANs
- Configuring Private VLANs
- Configuring Cisco IP Phone Support
- Configuring IEEE 802.1Q Tunneling
- Configuring Layer 2 Protocol Tunneling
- Configuring L2TPv3
- Configuring STP and MST
- Configuring Optional STP Features
- Configuring Layer 3 Interfaces
- Configuring GTP-SLB IPV6 Support
- IP Subscriber Awareness over Ethernet
- Configuring UDE and UDLR
- Configuring Multiprotocol Label Switching on the PFC
- Configuring IPv4 Multicast VPN Support
- Configuring Multicast VPN Extranet Support
- Configuring IP Unicast Layer 3 Switching
- Configuring IPv6 Multicast PFC3 and DFC3 Layer 3 Switching
- Configuring IPv4 Multicast Layer 3 Switching
- Configuring MLDv2 Snooping for IPv6 Multicast Traffic
- Configuring IGMP Snooping for IPv4 Multicast Traffic
- Configuring PIM Snooping
- Configuring Network Security
- Understanding Cisco IOS ACL Support
- Configuring VRF aware 6RD Tunnels
- Configuring VLAN ACLs
- Private Hosts (Using PACLs)
- Configuring IPv6 PACL
- IPv6 First-Hop Security Features
- Configuring Online Diagnostics
- Configuring Denial of Service Protection
- Configuring DHCP Snooping
- Configuring Dynamic ARP Inspection
- Configuring Traffic Storm Control
- Unknown Unicast Flood Blocking
- Configuring PFC QoS
- Configuring PFC QoS Statistics Data Export
- Configuring MPLS QoS on the PFC
- Configuring LSM MLDP based MVPN Support
- Configuring IEEE 802.1X Port-Based Authentication
- Configuring IEEE 802.1ad
- Configuring Port Security
- Configuring UDLD
- Configuring NetFlow and NDE
- Configuring Local SPAN, RSPAN, and ERSPAN
- Configuring SNMP IfIndex Persistence
- Power Management and Environmental Monitoring
- Configuring Web Cache Services Using WCCP
- Using the Top N Utility
- Using the Layer 2 Traceroute Utility
- Configuring Bidirectional Forwarding and Detection over Switched Virtual Interface
- Configuring Call Home
- Configuring IPv6 Policy Based Routing
- Using the Mini Protocol Analyzer
- Configuring Resilient Ethernet Protocol
- Configuring Synchronous Ethernet
- Configuring Link State Tracking
- Configuring BGP PIC Edge and Core for IP and MPLS
- Configuring VRF aware IPv6 tunnels over IPv4 transport
- ISIS IPv4 Loop Free Alternate Fast Reroute (LFA FRR)
- Multicast Service Reflection
- Y.1731 Performance Monitoring
- Online Diagnostic Tests
- Acronyms
- Cisco IOS Release 15S Software Images
- Index
Index
!Mini Protocol Analyzer 66-1
4K VLANs (support for 4,096 VLANs) 14-2
802.10 SAID (default) 14-6
encapsulation 10-3
See Layer 2 protocol tunneling
mapping to ISL VLANs 14-14, 14-17
trunks 10-2
restrictions 10-5
tunneling 17-1
configuration guidelines 17-3
configuring tunnel ports 17-6
802.1Q Ethertype, specifying custom 10-15
802.3X Flow Control 8-12
AAA 35-1, 36-1, 43-1
access control entries and lists 35-1, 36-1, 43-1
access-enable host timeout (not supported) 36-2
access interface (IP subscriber) 24-3
access lists, using with WCCP 60-10
access port, configuring 10-13
ACEs and ACLs 35-1, 36-1, 43-1
acronyms, list of A-1, B-1
advertisements, VTP 13-3
aggregate label 26-2, 26-4
IP MLS 56-20
for MSTP 20-47
MSTP accelerated 20-46
MSTP maximum 20-47
major 59-12
minor 59-12
Allow DHCP Option 82 on Untrusted Port
configuring 44-10
understanding 44-3
any transport over MPLS (AToM) 26-18
compatibility with previous releases of AToM 26-20
Ethernet over MPLS 26-24
ARP spoofing 45-1
AToM 26-18
See also port-based authentication
Authentication, Authorization, and Accounting
Authentication, Authorization, and Accounting (AAA) 43-1
authorized ports with 802.1X 52-4
auto-sync command 7-6
bandwidth-remaining ratio (BRR), IP subscriber 24-5, 24-21, 24-23
binding database, DHCP snooping
See DHCP snooping binding database
binding database, DHCP snooping
See DHCP snooping binding database
blocking floods 47-1
blocking state, STP 20-7
boot bootldr command 2-19
boot command 2-16
boot config command 2-19
boot system command 2-15, 2-19
boot system flash command 2-16
BPDU, RSTP format 20-15
Bridge Domain 57-29
Bridged Routed Encapsulation within an Automatic Protection Switching Group 14-8
bridge groups 22-2
bridge priority, STP 20-33
bridging 22-1
cache engine clusters 60-1
cache engines 60-1
description 64-1
message format options 64-1
format options 64-1
call home 64-1
alert groups 64-6
configuring e-mail options 64-9
contact information 64-3
default settings 64-18
destination profiles 64-4
displaying information 64-14
mail-server priority 64-10
pattern matching 64-9
periodic notification 64-8
rate limit messages 64-9
severity threshold 64-8
smart call home feature 64-2
SMTP server 64-9
testing communications 64-10
configuring 64-6
description 64-6
subscribing 64-6
assigning information 64-3
call home destination profiles
attributes 64-4
configuring 64-5
description 64-4
displaying 64-16
full-txt format for syslog 64-28
XML format for syslog 64-29
encrypting 2-11
TACACS+ 2-10
MSFC2 29-5
supervisor engine 29-4
examples 29-3
Layer 3 switching 29-2
packet rewrite 29-2
certificate authority (CA) 64-3
CGMP 33-8
command 12-9, 12-12
command example 12-9
checking running configuration 2-4
Cisco Cache Engines 60-2
Cisco Express Forwarding 26-3
Cisco Group Management Protocol
Cisco IOS Release 12.2SRB software images C-1
Cisco IOS Unicast Reverse Path Forwarding 35-2
CiscoView 1-2
class command 48-62
classification (QoS) 48-107
class-map command 48-54
class map configuration 48-59
class of service (CoS) 48-107
Committed Access Rate (CAR), not supported 48-2
community ports 15-3
community VLANs 15-2, 15-3
Concurrent routing and bridging (CRB) 22-1
CONFIG_FILE environment variable
configuration file, viewing 2-20
description 2-19
config-register command 2-16, 2-17
config terminal command 2-3
file, saving 2-5
changing settings 2-16 to 2-17
configuration 2-14 to 2-17
settings at startup 2-15
EoMPLS port mode 26-25, 26-27
EoMPLS VLAN mode 26-25
configuration register boot field
listing value 2-17
modification tasks 2-16
configure command 2-3
configure terminal command 2-16, 8-2
configuring 48-61
sample configuration 2-2
using configuration mode 2-3 to 2-4
Configuring GTP-SLB IPv6 Support 23-4
assigning for call home 64-3
control plane policing and protection (CoPP)
per-subscriber 24-4
applying QoS service policy to control plane 43-31
ACLs to match traffic 43-31
enabling MLS QoS 43-31
packet classification criteria 43-31
service-policy map 43-31
control plane configuration mode, entering 43-31
dynamic information 43-33
number of conforming bytes and packets 43-33
rate information 43-33
entering control plane configuration mode 43-31
monitoring statistics 43-33
overview 43-29
packet classification guidelines 43-32
defining 43-38
guidelines 43-39
overview 43-38
sample ACLs 43-39
sample classes 43-38
CoPP. See control plane policing and protection (CoPP)
copy running-config startup-config command 2-5
startup-config command 2-19
CoS, override priority 16-7, 16-8
data gleaning 41-4
dCEF 29-4, 29-5
IP MMLS 31-25
debug fm private-hosts command 39-31
debug private-hosts command 39-32
DEC spanning-tree protocol 22-2
802.1X 52-6
dynamic ARP inspection 45-5
Flex Links 11-2
IP MMLS 31-7
LLDP 17-9
MSTP 20-37
supervisor engine 2-1
UDLD 55-3
voice VLAN 16-4
VTP 13-6
default NDE configuration 56-14
default VLAN 10-10
deficit weighted round robin 48-94
description command 8-14
destination-ip flow mask 56-3
destination-source-ip flow mask 56-3
call home format 64-25
See DHCP snooping binding database
See DHCP snooping binding database
circuit ID suboption 44-5
overview 44-3
circuit ID 44-5
remote ID 44-5
remote ID suboption 44-5
DHCP option 82 allow on untrusted port 44-10
See DHCP snooping binding database
configuration guidelines 44-6
configuring 44-8
default configuration 44-6
displaying binding tables 44-18
enabling 44-9, 44-10, 44-11, 44-13
enabling the database agent 44-14
message exchange process 44-4
option 82 data insertion 44-3
overview 44-1
Snooping database agent 44-5
DHCP snooping binding database
described 44-2
entries 44-2
See DHCP snooping binding database
adding to the database (example) 44-17
enabling (example) 44-15
overview 44-5
reading from a TFTP file (example) 44-16
DHCP snooping increased bindings limit 44-7, 44-15
differentiated services codepoint
Differentiated Services Code Point (DSCP) 48-107
configuring short pipe mode 50-34
configuring uniform mode 50-39
short pipe mode 50-31
uniform mode 50-32
DiffServ tunneling modes 50-4
Disabling PIM Snooping Designated Router Flooding 34-5
distributed Cisco Express Forwarding
documentation, related 1-lxi
document organization 1-lvii
monitoring packet drop statistics
using monitor session commands 43-24
using VACL capture 43-25
PFC configuration guidelines and restrictions 43-23
Supervisor Engine 720 43-10
default configurations 43-22
egress ACL bridget packet rate limiters 43-16
FIB glean rate limiters 43-18
FIB receive rate limiters 43-18
ICMP redirect rate limiters 43-18
IGMP unreachable rate limiters 43-17
ingress ACL bridget packet rate limiters 43-16
IP errors rate limiters 43-20
IPv4 multicast rate limiters 43-20
IPv6 multicast rate limiters 43-21
Layer 2 PDU rate limiters 43-19
Layer 2 protocol tunneling rate limiters 43-19
MTU failure rate limiters 43-19
multicast directyly connected rate limiters 43-20
multicast FIB miss rate limiters 43-20
multicast IGMP snooping rate limiters 43-19
network under SYN attack 43-13
QoS ACLs 43-12
security ACLs 43-11
TCP intercept 43-13
traffic storm control 43-13
TTL failure rate limiter 43-17
uRPF check 43-12
uRPF failure rate limiters 43-17
VACL log rate limiters 43-19
Supervisor Engine 720Layer 3 security features rate limiters 43-18
DSCP-based queue mapping 48-86
IP subscriber 24-5, 24-25
duplex command 8-7
configuring interface 8-5
DWRR 48-94
ARP cache poisoning 45-2
ARP requests, described 45-1
ARP spoofing attack 45-2
log buffer 45-16
statistics 45-16
configuration guidelines 45-5
log buffer 45-13, 45-14
logging system messages 45-14
rate limit for incoming ARP packets 45-4, 45-9
default configuration 45-5
denial-of-service attacks, preventing 45-9
described 45-1
DHCP snooping binding database 45-3
ARP ACLs 45-15
configuration and operating state 45-15
log buffer 45-16
statistics 45-16
trust state and rate limit 45-15
error-disabled state for exceeding rate limit 45-4
function of 45-2
interface trust states 45-3
clearing 45-16
configuring 45-13, 45-14
displaying 45-16
logging of dropped packets, described 45-4
configuring 45-14
man-in-the middle attack, described 45-2
network security issues and interface trust states 45-3
priority of ARP ACLs and DHCP snooping entries 45-4
configuring 45-9
described 45-4
error-disabled state 45-4
clearing 45-16
displaying 45-16
validation checks, performing 45-11
Dynamic Host Configuration Protocol snooping
eFSU. See enhanced Fast Software Upgrade (eFSU)
Egress ACL support for remarked DSCP 48-12
egress ACL support for remarked DSCP 48-50
egress replication performance improvement 31-13
assigning for call home 64-3
Call Home 64-1
Embedded CiscoView 1-2
enable command 2-3, 2-16
enable sticky secure MAC address 54-8
on router interfaces 31-11
encapsulation 10-3
encapsulation frame-relay ietf command 57-38
enhanced Fast Software Upgrade (eFSU)
aborting (issu abortversion command) 6-19
accepting the new software version 6-17
commiting the new software to standby RP (issu commitversion command) 6-17
disabling compatibility matrix check 6-10
displaying maximum outage time for line cards 6-14
error handling 6-4
forcing a switchover (issu runversion command) 6-14
issu loadversion command 6-12
loading new software onto standby RP 6-12
memory reservation on line card 6-3
memory reservation on line card, prohibiting 6-3
OIR not supported 6-7
operation 6-2
outage times 6-3
overview 6-1
performing 6-8
SSO, RPR, and RPR+ modes 6-7
steps 6-8
usage guidelines and limitations 6-7
verifying redundancy mode 6-10
enhanced interface range command 8-3
LED indications 59-12
SNMP traps 59-12
supervisor engine and switching modules 59-12
Syslog messages 59-12
using CLI commands 59-10
CONFIG_FILE 2-19
controlling 2-19
viewing 2-19
EoMPLS 26-18
configuring 26-23
configuring VLAN mode 26-24
guidelines and restrictions 26-19
port mode 26-24
port mode configuration guidelines 26-27
VLAN mode 26-24
configuration files cleared with 2-6
ERSPAN 57-1
ERSPAN on EVC 57-29
command 12-9, 12-12
command example 12-9
configuration guidelines 12-5
Layer 2 12-8
configuring (tasks) 12-7
command example 12-8
interface port-channel (command) 12-8
command example 12-11
Layer 2, configuring 12-8
configuring 12-11
understanding 12-5
modes 12-2
PAgP, understanding 12-3
port-channel interfaces 12-5
command 12-10, 12-11
command example 12-11
STP 12-5
switchport trunk encapsulation dot1q 12-6
understanding 12-1
EtherChannel Min-Links 12-12
Ethernet, setting port duplex 8-13
Ethernet over MPLS (EoMPLS) configuration
EoMPLS port mode 26-27
EoMPLS VLAN mode 26-24
EVC 57-29
software configuration register 2-14 to 2-17
EXP mutation 50-4
extended range VLANs 14-2
extended system ID, MSTP 20-40
Extensible Authentication Protocol over LAN 52-1
Extranet MVPN Architecture 28-1
fabric switching-mode allow dcef-only command on Supervisor Engine 720 5-2, 7-4
fall-back bridging 22-2
fiber-optic, detecting unidirectional links 55-1
FIB TCAM 26-3
destination host filter, specifying 56-28
destination TCP/UDP port, specifying 56-27
overview 56-7
protocol 56-28
source host and destination TCP/UDP port 56-27
configuration process 2-18
configuring router to boot from 2-18
loading system image from 2-18
security precautions 2-18
write protection 2-18
Flex Links 11-1
configuration guidelines 11-2
configuring 11-3
default configuration 11-2
description 11-1
monitoring 11-3
flood blocking 47-1
flow control 8-12
destination-ip 56-3
destination-source-ip 56-3
interface-destination-source-ip 56-3
ip-full 56-3
ip-interface-full 56-3
minimum 56-19
overview 56-3
NetFlow (Release 12.2SRA) 56-3
NetFlow (Release 12.2SRB) 56-3
completely and partially switched 31-3
MSTP 20-46
forward-delay time, MSTP 20-46
forward-delay time, STP 20-35
See EtherChannel load balancing
global parameters, configuring 2-2
GTP-SLB Support for IPv6 23-1
hardware Layer 3 switching, guidelines 29-4
hello time, MSTP 20-45
hello time, STP 20-34
High Capacity Power Supply Support 59-4
host ports 15-3
//www.cisco.com/en/US/docs/ios/qos/command/reference/qos_book.html 4-5
//www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html 40-8, 57-39, 57-42
ICMP unreachable messages 36-1
serial IDs 64-25
IEEE 802.10 SAID (default) 14-6
specifying custom 10-15
IEEE 802.3X Flow Control 8-12
IEEE bridging protocol 22-2
configuration guidelines 32-7, 33-7
enabling 33-10
Internet Group Management Protocol 33-1
join messages 33-2
enabling 33-12
queries 33-3
query interval, configuring 33-11
fast leave 33-5
joining multicast group 33-2
leaving multicast group 33-4
understanding 33-2
enabling 33-9
understanding 33-2
IGMPv3 31-9
IGMP v3lite 31-9
In Service Software Upgrade (ISSU) 6-1
Integrated routing and bridging (IRB) 22-1
command 2-3
Layer 2 modes 10-4
number 8-1
interface, access (IP subscriber) 24-3
interface access command 24-33
interface-destination-source-ip flow mask 56-3
command example 12-8
interface port-channel (command) 12-8
configuring 8-2
configuring, duplex mode 8-5
configuring, speed 8-5
configururing, overview 8-1
descriptive name, adding 8-14
naming 8-14
range of 8-3
interfaces command 8-2
interfaces range command 8-3
interfaces range macro command 8-4
Internet Group Management Protocol
IP accounting, IP MMLS and 31-8
assigned by BOOTP protocol 2-6
set to default 2-6
IP CEF, topology (figure) 29-3
ip flow-export destination command 56-24
ip flow-export source command 56-23, 56-25, 61-2, 61-3, 61-4
ip-full flow mask 56-3
ip http server 1-1
ip-interface-full flow mask 56-3
aging-time 56-20
destination-ip 56-3
destination-source-ip 56-3
interface-destination-source-ip 56-3
ip-full 56-3
ip-interface-full 56-3
minimum 56-19
overview 56-3
cache, overview 31-2
configuration guideline 31-7
debug commands 31-25
default configuration 31-7
on router interfaces 31-11
completely and partially switched 31-3
Layer 3 MLS cache 31-2
overview 31-2
packet rewrite 31-3
displaying interface information 31-17
enabling globally 31-9
enabling on interfaces 31-11
multicast routing table, displaying 31-20
PIM, enabling 31-10
unsupported features 31-8
IGMP snooping and 33-9
MLDv2 snooping and 32-9
overview 33-1
enabling IP multicast 31-10
IP phone, configuring 16-5
enabling IP PIM 31-10
IP precedence 48-108
IP static routes 2-5
benefits 24-2
configuration example 24-30
configuration guidelines 24-27
configuring 24-28, 24-29
control plane policing and protection (CoPP) 24-4
interface access command 24-33
IP subscriber interface 24-3
IP subscriber session 24-3
lawful intercept 24-4
overview 24-1
per-subscriber features 24-4
QoS 24-4
bandwidth-remaining ratio (BRR) 24-5, 24-21, 24-23
dual-priority queues 24-5, 24-25
priority-rate propagation 24-5, 24-25, 24-26
QoS recommendations 24-20
Radius accounting 24-4
security ACLs 24-4
unsupported features 24-26
IP unnumbered 22-1
IPv4 Multicast over Point-to-Point GRE Tunnels 1-4
IPv4 Multicast VPN 27-1
IPv6 Multicast PFC3 and DFC3 Layer 3 Switching 30-1
IPv6 Prefix Guard 41-3
IPv6 Source Guard 41-2
ip wccp version command 60-8
ISL encapsulation 10-3
ISL trunks 10-2
isolated port 15-3
isolated VLANs 15-2, 15-3
ISSU, See In Service Software Upgrade (ISSU)
join messages, IGMP 33-2
jumbo frames 8-8
label edge router 26-2
label switched path 26-23
label switch router 26-2, 26-3
system ID 12-4
Verification 23-13
configuration commands, configuration steps 18-6, 23-5, 23-8, 68-6, 68-8, 68-9, 68-11
Examples 23-12
lawful intercept, per-subscriber 24-4
configuring interfaces 10-6
access port 10-13
trunk 10-7
defaults 10-5
interface modes 10-4
show interfaces 8-11, 10-7, 10-12
switching 10-1
trunks 10-2
VLAN interface assignment 14-13
Layer 2 interfaces, configuring 10-1
configuring Layer 2 tunnels 18-2
overview 18-1
Layer 2 remarking 48-14
Layer 2 Traceroute 62-1
and ARP 62-2
and CDP 62-1
described 62-1
IP addresses and subnets 62-2
MAC addresses and VLANs 62-2
multicast traffic 62-2
multiple devices on a port 62-2
unicast traffic 62-1
usage guidelines 62-1
IP MMLS and MLS cache 31-2
Layer 3 switched packet rewrite
CEF 29-2
CEF 29-2
Layer 4 port operations (ACLs) 36-5
enabling 33-12
enabling 32-12
LERs 50-2, 50-6, 50-7
link failure, detecting unidirectional 20-24
link negotiation 8-7
default configuration 17-9
Load Balancing 26-8
Local Egress Replication 31-13
description 36-6
determining maximum number of 36-6
LSRs 50-2, 50-6
adding to BOOTP configuration file 2-6
MAC address-based blocking 35-1
MAC move (port security) 54-2
macro, interfaces range 8-4
main-cpu command 7-6
mapping 802.1Q VLANs to ISL VLANs 14-14, 14-17
maximum aging time, MSTP 20-47
maximum aging time, STP 20-35
maximum hop count, MSTP 20-47
Min-Links 12-12
MLD report 32-4
query interval, configuring 32-11
MLDv2 32-1
enabling 32-9
enabling 32-12
queries 32-4
fast leave 32-6
joining multicast group 32-4
leaving multicast group 32-6
understanding 32-1
enabling 32-8
understanding 32-1
MLDv2 Snooping 32-1
configuring threshold 31-14
MSFC threshold 31-14
configuring IP MLS 56-21
configuring IP MLS 56-19, 56-20
enabling IP MMLS 31-11, 31-12, 31-14, 31-15, 31-16, 31-22, 31-23
configuring a host and port filter 56-27
configuring a host flow filter 56-28
configuring a port filter 56-27
configuring a protocol flow filter 56-28
mls nde sender command 56-21
Flex Links 11-3
private VLANs 15-16
MPLS 26-2
aggregate label 26-2
any transport over MPLS 26-18
basic configuration 26-8
core 26-3
DiffServ Tunneling Modes 50-31
egress 26-4
experimental field 50-3
guidelines and restrictions 26-7
ingress 26-3
IP to MPLS path 26-3
labels 26-2
Layer 2 VPN load balancing 26-8
MPLS to IP path 26-4
MPLS to MPLS path 26-3
nonaggregate lable 26-2
QoS default configuration 50-15
VPN 50-12
VPN guidelines and restrictions 26-15
mpls l2 transport route command 26-20
Classification 50-2
Class of Service 50-2
commands 50-16
configuring a class map 50-20
configuring a policy map 50-23
configuring egress EXP mutation 50-28
configuring EXP Value Maps 50-30
Differentiated Services Code Point 50-2
displaying a policy map 50-27
E-LSP 50-2
enabling QoS globally 50-18
EXP bits 50-2
features 50-3
IP Precedence 50-2
QoS Tags 50-2
queueing-only mode 50-19
class map to classify MPLS packets 50-20
MPLS VPN, limitations and restrictions 26-15
MQC 48-1
CAR 48-2
queuing 48-2
policy maps 48-3
configuration guidelines 20-38
described 20-22
CIST, described 20-19
CIST root 20-21
configuration guidelines 20-37
forward-delay time 20-46
link type for rapid convergence 20-47
maximum aging time 20-47
maximum hop count 20-47
MST region 20-38
neighbor type 20-48
path cost 20-43
port priority 20-42
root switch 20-40
secondary root switch 20-41
switch priority 20-44
configuring hello time 20-45
defined 20-19
operations between regions 20-20
default configuration 20-37
displaying status 20-49
enabling the mode 20-38
effects on root switch 20-40
effects on secondary root switch 20-41
unexpected behavior 20-40
implementation 20-23
port role naming change 20-23
terminology 20-21
interoperability with IEEE 802.1D
described 20-25
restarting migration process 20-49
defined 20-19
master 20-20
operations within a region 20-20
mapping VLANs to MST instance 20-39
CIST 20-19
configuring 20-38
described 20-18
hop-count mechanism 20-22
IST 20-19
supported spanning-tree instances 20-19
overview 20-17
configuring 20-40
effects of extended system ID 20-40
unexpected behavior 20-40
status, displaying 20-49
MTU size (default) 14-6
IGMP snooping and 33-9
MLDv2 snooping and 32-9
NetFlow statistics 56-14
non-RPF 31-5
overview 33-1
PIM snooping 34-3
multicast, displaying routing table 31-20
Multicast enhancement - egress replication performance improvement 31-13
Multicast Enhancement - Replication Mode Detection 31-11
multicast flood blocking 47-1
joining 33-2
leaving 32-6, 33-4
joining 32-4
Multicast Listener Discovery version 2
multicast multilayer switching
Multicast Replication Mode Detection enhancement 31-11
multicast RPF 31-2
Multicast VPN 28-1
multilayer switch feature card
multiple path RPF check 35-2
native VLAN 10-10
NBAR 48-1
configuration, displaying 56-29
displaying configuration 56-29
enabling 56-15
destination host, specifying 56-28
destination TCP/UDP port, specifying 56-27
overview 56-7
protocol, specifying 56-28
source host and destination TCP/UDP port, specifying 56-27
multicast 56-14
overview 56-1
destination host filters 56-28
destination TCP/UDP port filters 56-27
protocol filters 56-28
NDE configuration, default 56-14
NDE version 8 56-10
NetFlow and NDE for Ingress Bridged IP Traffic 56-24
Netflow Multiple Export Destinations 56-24
NetFlow version 9 56-3
Network-Based Application Recognition 48-1
nonaggregate label 26-2, 26-4
non-RPF multicast 31-5
nonvolatile random-access memory
NSF 5-1
NSF with SSO does not support IPv6 multicast traffic. 5-1
saving settings 2-5
OIR 8-14
configuring 42-2
diagnostic sanity check 42-11
memory tests 42-10
overview 42-1
running tests 42-6
schedule switchover 42-10
test descriptions A-1
understanding 42-1
online diagnostic tests A-1
packet burst 43-16
packet capture 66-1
packet recirculation 48-12
CEF 29-2
IP MMLS and 31-3
multicast 38-3
PACLs. See private hosts feature
understanding 12-3
enable password 2-9
enable secret 2-9
line password 2-9
static enable password 2-8
TACACS+ 2-10
TACACS+ (caution) 2-10
encrypting 2-10
(caution) 2-11
recovering lost enable passwords 2-13
MSTP 20-43
PBR 1-4, 22-4
hardware features 26-4
MPLS guidelines and restrictions 26-7
MPLS label switching 26-1
MPLS supported commands 26-7
recirculation 26-4
supported Cisco IOS features 26-5
VPN supported commands 26-16
VPN switching 26-14
PFC compatibility with RSP720 4-1
PIM, IP MMLS and 31-10
designated router flooding 34-5
enabling globally 34-4
enabling in a VLAN 34-5
overview 34-3
police command 48-65
policing, QoS (definition) 48-108
policy 48-54
policy map 48-61
attaching to an interface 48-68
policy-map command 48-54, 48-62
port-based ACLs (PACLs). See private hosts feature
defined 52-2
RADIUS server 52-2
client, defined 52-2
configuration guidelines 52-7
initializing authentication of a client 52-12
manual reauthentication of a client 52-11
quiet period 52-12
RADIUS server 52-10
RADIUS server parameters on the switch 52-9
switch-to-authentication-server retransmission time 52-14
switch-to-client EAP-request frame retransmission time 52-14
switch-to-client frame-retransmission number 52-15
switch-to-client retransmission time 52-13
default configuration 52-6
described 52-1
device roles 52-2
displaying statistics 52-17
EAPOL-start frame 52-3
EAP-request/identity frame 52-3
EAP-response/identity frame 52-3
802.1X authentication 52-8, 52-9
periodic reauthentication 52-11
encapsulation 52-2
initiation and message exchange 52-3
method lists 52-8
authorization state and dot1x port-control command 52-4
authorized and unauthorized 52-4
resetting to default values 52-16
as proxy 52-2
RADIUS client 52-2
topologies, supported 52-5
switchport trunk encapsulation dot1q 12-6
command 12-10, 12-11
command example 12-11
port cost, STP 20-32
port debounce timer 8-13
See STP PortFast BPDU filtering
port mode 26-24
port negotiation 8-7
MSTP 20-42
port priority, STP 20-30
setting the debounce timer 8-13
aging 54-9, 54-10
configuring 54-4
default configuration 54-3
described 54-1
displaying 54-11
enable sticky secure MAC address 54-8
violations 54-2
Port Security is supported on trunks 54-4, 54-7, 54-9
port security MAC move 54-2
port security on PVLAN ports 54-3
Port Security with Sticky Secure MAC Addresses 54-2
enabling/disabling redundancy 59-2
overview 59-1
powering modules up or down 59-3
system power requirements, nine-slot chassis 59-5
primary links 11-1
primary VLANs 15-2
overriding CoS 16-7, 16-8
priority-rate propagation, IP subscriber 24-5, 24-25, 24-26
private-hosts command 39-14
command reference 39-13
configuration guidelines 39-5, 39-6
configuring (detailed steps) 39-10
configuring (summary) 39-9
debug fm private-hosts command 39-31
debug private-hosts command 39-32
isolating hosts in a VLAN 39-2
multicast operation 39-9
overview 39-1
port ACLs (PACLs) 39-4
port types 39-3
private-hosts command 39-14
private-hosts mac-list command 39-15
private-hosts mode command 39-17
private-hosts promiscuous command 39-19
private-hosts vlan-list command 39-21
protocol-independent MAC ACLs 39-1
restricting traffic flow with PACLs 39-3
show fm private-hosts command 39-23
show private-hosts access-lists command 39-26
show private-hosts configuration command 39-28
show private-hosts interface configuration command 39-29
show private-hosts mac-list command 39-30
spoofing protection 39-9
private-hosts mac-list command 39-15
private-hosts mode command 39-17
private-hosts promiscuous command 39-19
private-hosts vlan-list command 39-21
private VLANs 15-1
across multiple switches 15-5
and SVIs 15-6
benefits of 15-2
community VLANs 15-2, 15-3
configuration guidelines 15-7, 15-9, 15-11
configuring 15-11
host ports 15-14
pomiscuous ports 15-15
routing secondary VLAN ingress traffic 15-13
secondary VLANs with primary VLANs 15-12
VLANs as private 15-11
end station access to 15-4
IP addressing 15-4
isolated VLANs 15-2, 15-3
monitoring 15-16
community 15-3
configuration guidelines 15-9
isolated 15-3
promiscuous 15-3
primary VLANs 15-2
secondary VLANs 15-2
subdomains 15-2
traffic in 15-6
changing default 2-12
multiple levels 2-11
privilege level 2-11
exiting 2-12
logging in 2-12
global parameters, configuring 2-2
using configuration mode 2-3 to 2-4
promiscuous ports 15-3
See Layer 2 protocol tunneling 18-1
See Rapid-PVST 20-17
class of service (CoS), definition 48-107
DSCP (definition) 48-107
IP precedence 48-108
marking 48-108
policing 48-108
Type of Service (ToS) 48-108
QoS, per-subscriber 24-4
QoS classification (definition)
classification 48-107
congestion avoidance 48-107
and ToS final L3 Switching Engine values 48-11
and ToS final values from L3 Switching Engine 48-11
port value, configuring 48-79
QoS default configuration 48-97, 49-2
definition 48-107
internal values 48-9
maps, configuring 48-74
configuring 48-79, 48-84
QoS enhancements, RSP720 4-4
scheduling 48-97
scheduling, congestion avoidance, and marking 48-11, 48-13
classification, marking, scheduling, and congestion avoidance 48-6
QoS final L3 Switching Engine CoS and ToS values 48-11
QoS internal DSCP values 48-9
classification, marking, and policing 48-9
feature summary 48-15
QoS labels (definition) 48-108
CoS values to DSCP values 48-71, 48-74
DSCP markdown values 48-27, 48-75, 50-16
DSCP mutation 48-70, 50-29
DSCP values to CoS values 48-77
IP precedence values to DSCP values 48-75
QoS markdown 48-20
definition 48-108
trusted ports 48-14
untrusted ports 48-14
marking 48-17
QoS multilayer switch feature card 48-17
feature summary 48-13
QoS out of profile 48-19
definition 48-108
microflow, enabling for nonrouted traffic 48-48
aggregate 48-17
creating 48-53
microflow 48-17
trust state 48-77
QoS port-based or VLAN-based 48-49
transmit, allocating bandwidth between 48-94
QoS receive queue 48-8, 48-90, 48-92
drop thresholds 48-22
QoS scheduling (definition) 48-108
QoS statistics data export 49-1
configuring 49-2
configuring destination host 49-7
configuring time interval 49-6, 49-9
and CoS final values from L3 Switching Engine 48-11
definition 48-108
QoS traffic flow through QoS features 48-4
size ratio 48-95, 48-96
QoS transmit queues 48-23, 48-87, 48-88, 48-91
port keyword 48-14, 48-15
port keyword 48-14, 48-15
port keyword 48-14, 48-15
QoS untrusted port keyword 48-14, 48-15
QoS VLAN-based or port-based 48-10, 48-49
queries, IGMP 33-3
queries, MLDv2 32-4
dual-priority (IP subscriber) 24-5, 24-25
Radius accounting, per-subscriber 24-4
rapid convergence 20-13
enabling 20-36
overview 20-17
recirculation 26-4, 48-12
reduced MAC address 20-2
redundancy (NSF) 5-1
BGP 5-13
CEF 5-13
EIGRP 5-18
IS-IS 5-15
OSPF 5-14
configuring multicast NSF with SSO 5-12
configuring supervisor engine 5-10
routing protocols 5-4
redundancy (RPR+) 7-1
configuring 7-6
configuring supervisor engine 7-5
displaying supervisor engine configuration 7-7
redundancy command 7-6
route processor redundancy plus 7-3
redundancy command 5-11
related documentation 1-lxi
reload command 2-16, 2-17
Remote source-route bridging (RSRB) 22-1
Replication Mode Detection 31-11
report, MLD 32-4
CEF 29-2
IP MMLS 31-3
RIF cache monitoring 8-15
rommon command 2-17
boot process and 2-14
root bridge, STP 20-28
MSTP 20-40
Route Switch Processor 720 (RSP720)
chassis support 4-1
feature support 4-2
flash memory 4-6
hardware components 4-2
high availability 4-3
IPv6 ACL enhancements 4-3
load balancing on GE bundles 4-4
overview 4-1
packet fragmentation over GRE tunnels 4-4
performance improvements 4-2
PFC compatibility 4-1
ports 4-6
QoS enhancements 4-4
rate-limiting of unknown unicast packets 4-3
scalability 4-3
switching modes 4-7
unsupported features 4-5
routing table, multicast 31-20
failure 31-5
multicast 31-2
non-RPF multicast 31-5
unicast 35-2
RPR and RPR+ support IPv6 multicast traffic 7-1
active topology 20-12
format 20-15
processing 20-16
designated port, defined 20-12
designated switch, defined 20-12
interoperability with IEEE 802.1D
described 20-25
restarting migration process 20-49
topology changes 20-17
overview 20-12
described 20-12
synchronized 20-14
proposal-agreement handshake process 20-13
described 20-13
edge ports and Port Fast 20-13
point-to-point links 20-13, 20-47
root ports 20-13
root port, defined 20-12
SAID 14-6
sample configuration 2-4
description 56-8
saving the configuration file 2-5
secondary VLANs 15-2
Secure MAC Address Aging Type 54-10
configuring 35-1, 36-1, 43-1
security, port 54-1
security ACLs, per-subscriber 24-4
security precautions with Flash memory card 2-18
description 64-25
description 64-26
service instance 57-30
service-policy command 48-54
service-policy input command 48-50, 48-68, 48-71, 48-73, 50-29
service-provider network, MSTP and RSTP 20-18
set power redundancy enable/disable command 59-2
short pipe mode, configuring 50-34
show boot command 2-19
show catalyst6000 chassis-mac-address command 20-3
show ciscoview package command 1-3
show ciscoview version command 1-3
show configuration command 8-14
show eobc command 8-15
show fm private-hosts command 39-23
show hardware command 8-2
show ibc command 8-15
show interfaces command 8-2, 8-11, 8-14, 8-15, 10-7, 10-12
displaying, interface type numbers 8-2
displaying, speed and duplex mode 8-8
displaying NDE export flow IP address and UDP port 56-26
displaying IP MMLS interfaces 31-18
displaying IP multicast routing table 31-20
displaying IP MMLS router configuration 31-18
show mls aging command 56-21
show mls entry command 29-5
show mls ip multicast group command
displaying IP MMLS group 31-21, 31-24
show mls ip multicast interface command
displaying IP MMLS interface 31-21, 31-24
show mls ip multicast source command
displaying IP MMLS source 31-21, 31-24
show mls ip multicast statistics command
displaying IP MMLS statistics 31-21, 31-24
displaying IP MMLS configuration 31-21, 31-24
show mls nde command 56-29
displaying NDE flow IP address 56-26
displaying IP MLS configuration 56-20
show module command 7-7
show private-hosts access-lists command 39-26
show private-hosts configuration command 39-28
show private-hosts interface configuration command 39-29
show private-hosts mac-list command 39-30
show protocols command 8-15
show rif command 8-15
show running-config command 2-4, 8-14, 8-15
show startup-config command 2-5
show version command 2-3, 2-17, 8-15
slot number, description 8-1
smart call home 64-1
description 64-2
destination profile (note) 64-4
registration requirements 64-2
service contract requirements 64-3
Transport Gateway (TG) aggregation point 64-2
smart call home registration 64-2
support and documentation 1-1
upgrading router 6-8
software configuration register functions 2-14 to 2-17
software images, Release 12.2SRB C-1
call home event format 64-25
source-only-ip flow mask 56-3
source specific multicast with IGMPv3, IGMP v3lite, and URD 31-9
configuration guidelines 57-6
configuring 57-11
sources 57-15, 57-19, 57-25, 57-27
VLAN filtering 57-34
overview 57-1
SPAN Destination Port Permit Lists 57-14
command 21-13
command example 21-13, 21-14
command 20-32
command example 20-32, 20-33
command 21-8, 21-9
command example 21-8
spanning-tree portfast bpdu-guard
command 21-11
command 20-30, 20-31
spanning-tree protocol for bridging 22-2
command 21-12
command example 21-12
command 20-27, 20-29, 21-14
command example 20-27, 20-29
command 20-32
spanning-tree vlan forward-time
command 20-35
command example 20-35
command 20-34
command example 20-34
command 20-35
command example 20-36
spanning-tree vlan port-priority
command 20-30
command example 20-31
command 20-33
command example 20-34
configuring interface 8-5
speed command 3-2, 8-6
standby link 11-1
standby links 11-1
static route, configuring 2-5
802.1X 52-17
Sticky ARP 43-41
sticky ARP 43-41
Sticky secure MAC addresses 54-8, 54-9
configuring 20-25
bridge priority 20-33
enabling 20-26, 20-28
forward-delay time 20-35
hello time 20-34
maximum aging time 20-35
port cost 20-32
port priority 20-30
root bridge 20-28
secondary root switch 20-29
defaults 20-26
EtherChannel 12-5
understanding 20-1
802.1Q Trunks 20-11
Blocking State 20-7
BPDUs 20-3
disabled state 20-10
forwarding state 20-9
learning state 20-8
listening state 20-7
overview 20-2
port states 20-5
protocol timers 20-4
root bridge election 20-4
topology 20-4
configuring 21-13
adding a switch 21-7
command 21-13
command example 21-13, 21-14
understanding 21-4
configuring 21-11
spanning-tree portfast bpdu-guard
command 21-11
understanding 21-2
STP bridge ID 20-2
STP EtherChannel guard 21-6
configuring 21-14
overview 21-6
configuring 21-10
BPDU filtering 21-2
configuring 21-8
command 21-8, 21-9
command example 21-8
understanding 21-2
STP root guard 21-6, 21-14
configuring 21-12
command 21-12
command example 21-12
understanding 21-3
subdomains, private VLAN 15-2
subscribers. See IP subscriber awareness
configuring 2-1
default configuration 2-1
environmental monitoring 59-10
redundancy 5-1, 7-1
ROM monitor 2-14
startup configuration 2-13
static routes 2-5
synchronizing configurations 5-19, 7-7
Supervisor Engine 2, no longer supported
Supervisor Engine 32 9-1
flash memory 9-1
ports 9-2
supported chassis 9-1
configuring 5-10, 7-5
displaying redundancy configuration 7-7
switch fabric functionality 3-2, 4-6
configuring 3-4, 4-8
monitoring 3-4, 4-9
configuring 10-13
example 10-12
show interfaces 8-11, 10-7, 10-12
switchport access vlan 10-10, 10-13
example 10-14
switchport mode access 10-4, 10-13
example 10-14
switchport mode dynamic 10-9
switchport mode dynamic auto 10-4
switchport mode dynamic desirable 10-4
default 10-5
example 10-12
switchport mode trunk 10-4, 10-9
switchport nonegotiate 10-4
switchport trunk allowed vlan 10-11
switchport trunk encapsulation 10-8
switchport trunk encapsulation dot1q 10-3
example 10-12
switchport trunk encapsulation isl 10-3
switchport trunk encapsulation negotiate 10-3
default 10-5
switchport trunk native vlan 10-10
switchport trunk pruning vlan 10-11
MSTP 20-44
foreground execution 61-2
overview 61-1
running 61-2
viewing 61-2
configuration 2-14 to 2-17
settings at startup 2-15
configuring global parameters 2-2
System Hardware Capacity 59-5
determining if and how to load 2-15
loading from Flash 2-18
TACACS+ 35-1, 36-1, 43-1
TCP Intercept 35-2
checking cable connectivity 8-16
enabling and disabling test 8-16
guidelines 8-16
and ARP 62-2
and CDP 62-1
described 62-1
IP addresses and subnets 62-2
MAC addresses and VLANs 62-2
multicast traffic 62-2
multiple devices on a port 62-2
unicast traffic 62-1
usage guidelines 62-1
traffic flood blocking 47-1
broadcast 46-4
described 46-1
monitoring 46-6
thresholds 46-1
translational bridge numbers (defaults) 14-6
trunks 10-2
802.1Q Restrictions 10-5
allowed VLANs 10-11
configuring 10-7
default interface configuration 10-7
default VLAN 10-10
different VTP domains 10-3
encapsulation 10-3
native VLAN 10-10
to non-DTP device 10-4
VLAN 1 minimization 10-11
trustpoint 64-3
tunneling 50-4, 50-31
See 802.1Q 17-1
Type of Service (ToS) 48-108
UDE 25-1
configuration 25-3
overview 25-2
UDE and UDLR 25-1
restrictions 24-7, 69-2
default configuration 55-3
globally 55-3
on ports 55-4
overview 55-1
UDLR 25-1
back channel 25-1
configuration 25-6
(example) 25-7
ARP and NHRP 25-3
UDLR (unidirectional link routing)
unauthorized ports with 802.1X 52-4
Unicast and Multicast Flood Blocking 47-1
unicast flood blocking 47-1
unicast RPF 35-2
example of setting 25-5
UniDirectional Link Detection Protocol
configuring 50-39
upgrade guidelines 26-20
URD 31-9
User-Based Rate Limiting 48-19, 48-66
VACLs 38-1
configuring 38-4
examples 38-9
Layer 3 VLAN interfaces 38-8
Layer 4 port operations 36-5
configuration example 38-11
configuring 38-10
restrictions 38-10
MAC address based 38-4
multicast packets 38-3
overview 38-1
SVIs 38-8
WAN interfaces 38-1
version 8 (NDE) 56-10
command 14-11, 14-13, 56-18, 57-19
command example 14-12
VLAN-based QoS filtering 48-56
VLAN-bridge spanning-tree protocol 22-2
command 14-11, 14-13, 56-18, 57-19
command 14-16, 14-17
command example 14-18
VLAN mode 26-24
allowed on trunk 10-11
configuration guidelines 14-8
configuring 14-1
configuring (tasks) 14-10
defaults 14-6, 14-8
extended range 14-2
ID (default) 14-6
interface assignment 14-13
name (default) 14-6
normal range 14-2
reserved range 14-2
support for 4,096 VLANs 14-2
token ring 14-3
understanding 10-2
understanding 14-1
VLAN 1 minimization 10-11
VTP domain 14-2
command example 14-16, 14-17
Cisco 7960 phone, port connections 16-1
configuration guidelines 16-4
configuring IP phone for data traffic
override CoS of incoming frame 16-7, 16-8
configuring ports for voice traffic in
802.1Q frames 16-5
connecting to an IP phone 16-5
default configuration 16-4
overview 16-1
configuration example 26-16
guidelines and restrictions 26-15
advertisements 13-3
client, configuring 13-11
configuration guidelines 13-6
default configuration 13-6
disabling 13-11
domains 13-2, 70-1
VLANs 14-2
client 13-2
server 13-2
transparent 13-2
monitoring 13-13
overview 13-1, 70-1
configuration 10-11
configuring 13-9
overview 13-5
server, configuring 13-11
statistics 13-13
transparent mode, configuring 13-11
enabling 13-10
overview 13-3
configuring on a router 60-2, 60-14
service groups 60-8
specifying protocol version 60-7
web browser interface 1-1
Web Cache Communication Protocol
description 60-5
web scaling 60-1
weighted round robin 48-94
WRR 48-94
xconnect command 26-20
Y.1731 Performance Monitoring 74-1
Index
!Mini Protocol Analyzer 66-1
4K VLANs (support for 4,096 VLANs) 14-2
802.10 SAID (default) 14-6
encapsulation 10-3
See Layer 2 protocol tunneling
mapping to ISL VLANs 14-14, 14-17
trunks 10-2
restrictions 10-5
tunneling 17-1
configuration guidelines 17-3
configuring tunnel ports 17-6
802.1Q Ethertype, specifying custom 10-15
802.3X Flow Control 8-12
AAA 35-1, 36-1, 43-1
access control entries and lists 35-1, 36-1, 43-1
access-enable host timeout (not supported) 36-2
access interface (IP subscriber) 24-3
access lists, using with WCCP 60-10
access port, configuring 10-13
ACEs and ACLs 35-1, 36-1, 43-1
acronyms, list of A-1, B-1
advertisements, VTP 13-3
aggregate label 26-2, 26-4
IP MLS 56-20
for MSTP 20-47
MSTP accelerated 20-46
MSTP maximum 20-47
major 59-12
minor 59-12
Allow DHCP Option 82 on Untrusted Port
configuring 44-10
understanding 44-3
any transport over MPLS (AToM) 26-18
compatibility with previous releases of AToM 26-20
Ethernet over MPLS 26-24
ARP spoofing 45-1
AToM 26-18
See also port-based authentication
Authentication, Authorization, and Accounting
Authentication, Authorization, and Accounting (AAA) 43-1
authorized ports with 802.1X 52-4
auto-sync command 7-6
bandwidth-remaining ratio (BRR), IP subscriber 24-5, 24-21, 24-23
binding database, DHCP snooping
See DHCP snooping binding database
binding database, DHCP snooping
See DHCP snooping binding database
blocking floods 47-1
blocking state, STP 20-7
boot bootldr command 2-19
boot command 2-16
boot config command 2-19
boot system command 2-15, 2-19
boot system flash command 2-16
BPDU, RSTP format 20-15
Bridge Domain 57-29
Bridged Routed Encapsulation within an Automatic Protection Switching Group 14-8
bridge groups 22-2
bridge priority, STP 20-33
bridging 22-1
cache engine clusters 60-1
cache engines 60-1
description 64-1
message format options 64-1
format options 64-1
call home 64-1
alert groups 64-6
configuring e-mail options 64-9
contact information 64-3
default settings 64-18
destination profiles 64-4
displaying information 64-14
mail-server priority 64-10
pattern matching 64-9
periodic notification 64-8
rate limit messages 64-9
severity threshold 64-8
smart call home feature 64-2
SMTP server 64-9
testing communications 64-10
configuring 64-6
description 64-6
subscribing 64-6
assigning information 64-3
call home destination profiles
attributes 64-4
configuring 64-5
description 64-4
displaying 64-16
full-txt format for syslog 64-28
XML format for syslog 64-29
encrypting 2-11
TACACS+ 2-10
MSFC2 29-5
supervisor engine 29-4
examples 29-3
Layer 3 switching 29-2
packet rewrite 29-2
certificate authority (CA) 64-3
CGMP 33-8
command 12-9, 12-12
command example 12-9
checking running configuration 2-4
Cisco Cache Engines 60-2
Cisco Express Forwarding 26-3
Cisco Group Management Protocol
Cisco IOS Release 12.2SRB software images C-1
Cisco IOS Unicast Reverse Path Forwarding 35-2
CiscoView 1-2
class command 48-62
classification (QoS) 48-107
class-map command 48-54
class map configuration 48-59
class of service (CoS) 48-107
Committed Access Rate (CAR), not supported 48-2
community ports 15-3
community VLANs 15-2, 15-3
Concurrent routing and bridging (CRB) 22-1
CONFIG_FILE environment variable
configuration file, viewing 2-20
description 2-19
config-register command 2-16, 2-17
config terminal command 2-3
file, saving 2-5
changing settings 2-16 to 2-17
configuration 2-14 to 2-17
settings at startup 2-15
EoMPLS port mode 26-25, 26-27
EoMPLS VLAN mode 26-25
configuration register boot field
listing value 2-17
modification tasks 2-16
configure command 2-3
configure terminal command 2-16, 8-2
configuring 48-61
sample configuration 2-2
using configuration mode 2-3 to 2-4
Configuring GTP-SLB IPv6 Support 23-4
assigning for call home 64-3
control plane policing and protection (CoPP)
per-subscriber 24-4
applying QoS service policy to control plane 43-31
ACLs to match traffic 43-31
enabling MLS QoS 43-31
packet classification criteria 43-31
service-policy map 43-31
control plane configuration mode, entering 43-31
dynamic information 43-33
number of conforming bytes and packets 43-33
rate information 43-33
entering control plane configuration mode 43-31
monitoring statistics 43-33
overview 43-29
packet classification guidelines 43-32
defining 43-38
guidelines 43-39
overview 43-38
sample ACLs 43-39
sample classes 43-38
CoPP. See control plane policing and protection (CoPP)
copy running-config startup-config command 2-5
startup-config command 2-19
CoS, override priority 16-7, 16-8
data gleaning 41-4
dCEF 29-4, 29-5
IP MMLS 31-25
debug fm private-hosts command 39-31
debug private-hosts command 39-32
DEC spanning-tree protocol 22-2
802.1X 52-6
dynamic ARP inspection 45-5
Flex Links 11-2
IP MMLS 31-7
LLDP 17-9
MSTP 20-37
supervisor engine 2-1
UDLD 55-3
voice VLAN 16-4
VTP 13-6
default NDE configuration 56-14
default VLAN 10-10
deficit weighted round robin 48-94
description command 8-14
destination-ip flow mask 56-3
destination-source-ip flow mask 56-3
call home format 64-25
See DHCP snooping binding database
See DHCP snooping binding database
circuit ID suboption 44-5
overview 44-3
circuit ID 44-5
remote ID 44-5
remote ID suboption 44-5
DHCP option 82 allow on untrusted port 44-10
See DHCP snooping binding database
configuration guidelines 44-6
configuring 44-8
default configuration 44-6
displaying binding tables 44-18
enabling 44-9, 44-10, 44-11, 44-13
enabling the database agent 44-14
message exchange process 44-4
option 82 data insertion 44-3
overview 44-1
Snooping database agent 44-5
DHCP snooping binding database
described 44-2
entries 44-2
See DHCP snooping binding database
adding to the database (example) 44-17
enabling (example) 44-15
overview 44-5
reading from a TFTP file (example) 44-16
DHCP snooping increased bindings limit 44-7, 44-15
differentiated services codepoint
Differentiated Services Code Point (DSCP) 48-107
configuring short pipe mode 50-34
configuring uniform mode 50-39
short pipe mode 50-31
uniform mode 50-32
DiffServ tunneling modes 50-4
Disabling PIM Snooping Designated Router Flooding 34-5
distributed Cisco Express Forwarding
documentation, related 1-lxi
document organization 1-lvii
monitoring packet drop statistics
using monitor session commands 43-24
using VACL capture 43-25
PFC configuration guidelines and restrictions 43-23
Supervisor Engine 720 43-10
default configurations 43-22
egress ACL bridget packet rate limiters 43-16
FIB glean rate limiters 43-18
FIB receive rate limiters 43-18
ICMP redirect rate limiters 43-18
IGMP unreachable rate limiters 43-17
ingress ACL bridget packet rate limiters 43-16
IP errors rate limiters 43-20
IPv4 multicast rate limiters 43-20
IPv6 multicast rate limiters 43-21
Layer 2 PDU rate limiters 43-19
Layer 2 protocol tunneling rate limiters 43-19
MTU failure rate limiters 43-19
multicast directyly connected rate limiters 43-20
multicast FIB miss rate limiters 43-20
multicast IGMP snooping rate limiters 43-19
network under SYN attack 43-13
QoS ACLs 43-12
security ACLs 43-11
TCP intercept 43-13
traffic storm control 43-13
TTL failure rate limiter 43-17
uRPF check 43-12
uRPF failure rate limiters 43-17
VACL log rate limiters 43-19
Supervisor Engine 720Layer 3 security features rate limiters 43-18
DSCP-based queue mapping 48-86
IP subscriber 24-5, 24-25
duplex command 8-7
configuring interface 8-5
DWRR 48-94
ARP cache poisoning 45-2
ARP requests, described 45-1
ARP spoofing attack 45-2
log buffer 45-16
statistics 45-16
configuration guidelines 45-5
log buffer 45-13, 45-14
logging system messages 45-14
rate limit for incoming ARP packets 45-4, 45-9
default configuration 45-5
denial-of-service attacks, preventing 45-9
described 45-1
DHCP snooping binding database 45-3
ARP ACLs 45-15
configuration and operating state 45-15
log buffer 45-16
statistics 45-16
trust state and rate limit 45-15
error-disabled state for exceeding rate limit 45-4
function of 45-2
interface trust states 45-3
clearing 45-16
configuring 45-13, 45-14
displaying 45-16
logging of dropped packets, described 45-4
configuring 45-14
man-in-the middle attack, described 45-2
network security issues and interface trust states 45-3
priority of ARP ACLs and DHCP snooping entries 45-4
configuring 45-9
described 45-4
error-disabled state 45-4
clearing 45-16
displaying 45-16
validation checks, performing 45-11
Dynamic Host Configuration Protocol snooping
eFSU. See enhanced Fast Software Upgrade (eFSU)
Egress ACL support for remarked DSCP 48-12
egress ACL support for remarked DSCP 48-50
egress replication performance improvement 31-13
assigning for call home 64-3
Call Home 64-1
Embedded CiscoView 1-2
enable command 2-3, 2-16
enable sticky secure MAC address 54-8
on router interfaces 31-11
encapsulation 10-3
encapsulation frame-relay ietf command 57-38
enhanced Fast Software Upgrade (eFSU)
aborting (issu abortversion command) 6-19
accepting the new software version 6-17
commiting the new software to standby RP (issu commitversion command) 6-17
disabling compatibility matrix check 6-10
displaying maximum outage time for line cards 6-14
error handling 6-4
forcing a switchover (issu runversion command) 6-14
issu loadversion command 6-12
loading new software onto standby RP 6-12
memory reservation on line card 6-3
memory reservation on line card, prohibiting 6-3
OIR not supported 6-7
operation 6-2
outage times 6-3
overview 6-1
performing 6-8
SSO, RPR, and RPR+ modes 6-7
steps 6-8
usage guidelines and limitations 6-7
verifying redundancy mode 6-10
enhanced interface range command 8-3
LED indications 59-12
SNMP traps 59-12
supervisor engine and switching modules 59-12
Syslog messages 59-12
using CLI commands 59-10
CONFIG_FILE 2-19
controlling 2-19
viewing 2-19
EoMPLS 26-18
configuring 26-23
configuring VLAN mode 26-24
guidelines and restrictions 26-19
port mode 26-24
port mode configuration guidelines 26-27
VLAN mode 26-24
configuration files cleared with 2-6
ERSPAN 57-1
ERSPAN on EVC 57-29
command 12-9, 12-12
command example 12-9
configuration guidelines 12-5
Layer 2 12-8
configuring (tasks) 12-7
command example 12-8
interface port-channel (command) 12-8
command example 12-11
Layer 2, configuring 12-8
configuring 12-11
understanding 12-5
modes 12-2
PAgP, understanding 12-3
port-channel interfaces 12-5
command 12-10, 12-11
command example 12-11
STP 12-5
switchport trunk encapsulation dot1q 12-6
understanding 12-1
EtherChannel Min-Links 12-12
Ethernet, setting port duplex 8-13
Ethernet over MPLS (EoMPLS) configuration
EoMPLS port mode 26-27
EoMPLS VLAN mode 26-24
EVC 57-29
software configuration register 2-14 to 2-17
EXP mutation 50-4
extended range VLANs 14-2
extended system ID, MSTP 20-40
Extensible Authentication Protocol over LAN 52-1
Extranet MVPN Architecture 28-1
fabric switching-mode allow dcef-only command on Supervisor Engine 720 5-2, 7-4
fall-back bridging 22-2
fiber-optic, detecting unidirectional links 55-1
FIB TCAM 26-3
destination host filter, specifying 56-28
destination TCP/UDP port, specifying 56-27
overview 56-7
protocol 56-28
source host and destination TCP/UDP port 56-27
configuration process 2-18
configuring router to boot from 2-18
loading system image from 2-18
security precautions 2-18
write protection 2-18
Flex Links 11-1
configuration guidelines 11-2
configuring 11-3
default configuration 11-2
description 11-1
monitoring 11-3
flood blocking 47-1
flow control 8-12
destination-ip 56-3
destination-source-ip 56-3
interface-destination-source-ip 56-3
ip-full 56-3
ip-interface-full 56-3
minimum 56-19
overview 56-3
NetFlow (Release 12.2SRA) 56-3
NetFlow (Release 12.2SRB) 56-3
completely and partially switched 31-3
MSTP 20-46
forward-delay time, MSTP 20-46
forward-delay time, STP 20-35
See EtherChannel load balancing
global parameters, configuring 2-2
GTP-SLB Support for IPv6 23-1
hardware Layer 3 switching, guidelines 29-4
hello time, MSTP 20-45
hello time, STP 20-34
High Capacity Power Supply Support 59-4
host ports 15-3
//www.cisco.com/en/US/docs/ios/qos/command/reference/qos_book.html 4-5
//www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html 40-8, 57-39, 57-42
ICMP unreachable messages 36-1
serial IDs 64-25
IEEE 802.10 SAID (default) 14-6
specifying custom 10-15
IEEE 802.3X Flow Control 8-12
IEEE bridging protocol 22-2
configuration guidelines 32-7, 33-7
enabling 33-10
Internet Group Management Protocol 33-1
join messages 33-2
enabling 33-12
queries 33-3
query interval, configuring 33-11
fast leave 33-5
joining multicast group 33-2
leaving multicast group 33-4
understanding 33-2
enabling 33-9
understanding 33-2
IGMPv3 31-9
IGMP v3lite 31-9
In Service Software Upgrade (ISSU) 6-1
Integrated routing and bridging (IRB) 22-1
command 2-3
Layer 2 modes 10-4
number 8-1
interface, access (IP subscriber) 24-3
interface access command 24-33
interface-destination-source-ip flow mask 56-3
command example 12-8
interface port-channel (command) 12-8
configuring 8-2
configuring, duplex mode 8-5
configuring, speed 8-5
configururing, overview 8-1
descriptive name, adding 8-14
naming 8-14
range of 8-3
interfaces command 8-2
interfaces range command 8-3
interfaces range macro command 8-4
Internet Group Management Protocol
IP accounting, IP MMLS and 31-8
assigned by BOOTP protocol 2-6
set to default 2-6
IP CEF, topology (figure) 29-3
ip flow-export destination command 56-24
ip flow-export source command 56-23, 56-25, 61-2, 61-3, 61-4
ip-full flow mask 56-3
ip http server 1-1
ip-interface-full flow mask 56-3
aging-time 56-20
destination-ip 56-3
destination-source-ip 56-3
interface-destination-source-ip 56-3
ip-full 56-3
ip-interface-full 56-3
minimum 56-19
overview 56-3
cache, overview 31-2
configuration guideline 31-7
debug commands 31-25
default configuration 31-7
on router interfaces 31-11
completely and partially switched 31-3
Layer 3 MLS cache 31-2
overview 31-2
packet rewrite 31-3
displaying interface information 31-17
enabling globally 31-9
enabling on interfaces 31-11
multicast routing table, displaying 31-20
PIM, enabling 31-10
unsupported features 31-8
IGMP snooping and 33-9
MLDv2 snooping and 32-9
overview 33-1
enabling IP multicast 31-10
IP phone, configuring 16-5
enabling IP PIM 31-10
IP precedence 48-108
IP static routes 2-5
benefits 24-2
configuration example 24-30
configuration guidelines 24-27
configuring 24-28, 24-29
control plane policing and protection (CoPP) 24-4
interface access command 24-33
IP subscriber interface 24-3
IP subscriber session 24-3
lawful intercept 24-4
overview 24-1
per-subscriber features 24-4
QoS 24-4
bandwidth-remaining ratio (BRR) 24-5, 24-21, 24-23
dual-priority queues 24-5, 24-25
priority-rate propagation 24-5, 24-25, 24-26
QoS recommendations 24-20
Radius accounting 24-4
security ACLs 24-4
unsupported features 24-26
IP unnumbered 22-1
IPv4 Multicast over Point-to-Point GRE Tunnels 1-4
IPv4 Multicast VPN 27-1
IPv6 Multicast PFC3 and DFC3 Layer 3 Switching 30-1
IPv6 Prefix Guard 41-3
IPv6 Source Guard 41-2
ip wccp version command 60-8
ISL encapsulation 10-3
ISL trunks 10-2
isolated port 15-3
isolated VLANs 15-2, 15-3
ISSU, See In Service Software Upgrade (ISSU)
join messages, IGMP 33-2
jumbo frames 8-8
label edge router 26-2
label switched path 26-23
label switch router 26-2, 26-3
system ID 12-4
Verification 23-13
configuration commands, configuration steps 18-6, 23-5, 23-8, 68-6, 68-8, 68-9, 68-11
Examples 23-12
lawful intercept, per-subscriber 24-4
configuring interfaces 10-6
access port 10-13
trunk 10-7
defaults 10-5
interface modes 10-4
show interfaces 8-11, 10-7, 10-12
switching 10-1
trunks 10-2
VLAN interface assignment 14-13
Layer 2 interfaces, configuring 10-1
configuring Layer 2 tunnels 18-2
overview 18-1
Layer 2 remarking 48-14
Layer 2 Traceroute 62-1
and ARP 62-2
and CDP 62-1
described 62-1
IP addresses and subnets 62-2
MAC addresses and VLANs 62-2
multicast traffic 62-2
multiple devices on a port 62-2
unicast traffic 62-1
usage guidelines 62-1
IP MMLS and MLS cache 31-2
Layer 3 switched packet rewrite
CEF 29-2
CEF 29-2
Layer 4 port operations (ACLs) 36-5
enabling 33-12
enabling 32-12
LERs 50-2, 50-6, 50-7
link failure, detecting unidirectional 20-24
link negotiation 8-7
default configuration 17-9
Load Balancing 26-8
Local Egress Replication 31-13
description 36-6
determining maximum number of 36-6
LSRs 50-2, 50-6
adding to BOOTP configuration file 2-6
MAC address-based blocking 35-1
MAC move (port security) 54-2
macro, interfaces range 8-4
main-cpu command 7-6
mapping 802.1Q VLANs to ISL VLANs 14-14, 14-17
maximum aging time, MSTP 20-47
maximum aging time, STP 20-35
maximum hop count, MSTP 20-47
Min-Links 12-12
MLD report 32-4
query interval, configuring 32-11
MLDv2 32-1
enabling 32-9
enabling 32-12
queries 32-4
fast leave 32-6
joining multicast group 32-4
leaving multicast group 32-6
understanding 32-1
enabling 32-8
understanding 32-1
MLDv2 Snooping 32-1
configuring threshold 31-14
MSFC threshold 31-14
configuring IP MLS 56-21
configuring IP MLS 56-19, 56-20
enabling IP MMLS 31-11, 31-12, 31-14, 31-15, 31-16, 31-22, 31-23
configuring a host and port filter 56-27
configuring a host flow filter 56-28
configuring a port filter 56-27
configuring a protocol flow filter 56-28
mls nde sender command 56-21
Flex Links 11-3
private VLANs 15-16
MPLS 26-2
aggregate label 26-2
any transport over MPLS 26-18
basic configuration 26-8
core 26-3
DiffServ Tunneling Modes 50-31
egress 26-4
experimental field 50-3
guidelines and restrictions 26-7
ingress 26-3
IP to MPLS path 26-3
labels 26-2
Layer 2 VPN load balancing 26-8
MPLS to IP path 26-4
MPLS to MPLS path 26-3
nonaggregate lable 26-2
QoS default configuration 50-15
VPN 50-12
VPN guidelines and restrictions 26-15
mpls l2 transport route command 26-20
Classification 50-2
Class of Service 50-2
commands 50-16
configuring a class map 50-20
configuring a policy map 50-23
configuring egress EXP mutation 50-28
configuring EXP Value Maps 50-30
Differentiated Services Code Point 50-2
displaying a policy map 50-27
E-LSP 50-2
enabling QoS globally 50-18
EXP bits 50-2
features 50-3
IP Precedence 50-2
QoS Tags 50-2
queueing-only mode 50-19
class map to classify MPLS packets 50-20
MPLS VPN, limitations and restrictions 26-15
MQC 48-1
CAR 48-2
queuing 48-2
policy maps 48-3
configuration guidelines 20-38
described 20-22
CIST, described 20-19
CIST root 20-21
configuration guidelines 20-37
forward-delay time 20-46
link type for rapid convergence 20-47
maximum aging time 20-47
maximum hop count 20-47
MST region 20-38
neighbor type 20-48
path cost 20-43
port priority 20-42
root switch 20-40
secondary root switch 20-41
switch priority 20-44
configuring hello time 20-45
defined 20-19
operations between regions 20-20
default configuration 20-37
displaying status 20-49
enabling the mode 20-38
effects on root switch 20-40
effects on secondary root switch 20-41
unexpected behavior 20-40
implementation 20-23
port role naming change 20-23
terminology 20-21
interoperability with IEEE 802.1D
described 20-25
restarting migration process 20-49
defined 20-19
master 20-20
operations within a region 20-20
mapping VLANs to MST instance 20-39
CIST 20-19
configuring 20-38
described 20-18
hop-count mechanism 20-22
IST 20-19
supported spanning-tree instances 20-19
overview 20-17
configuring 20-40
effects of extended system ID 20-40
unexpected behavior 20-40
status, displaying 20-49
MTU size (default) 14-6
IGMP snooping and 33-9
MLDv2 snooping and 32-9
NetFlow statistics 56-14
non-RPF 31-5
overview 33-1
PIM snooping 34-3
multicast, displaying routing table 31-20
Multicast enhancement - egress replication performance improvement 31-13
Multicast Enhancement - Replication Mode Detection 31-11
multicast flood blocking 47-1
joining 33-2
leaving 32-6, 33-4
joining 32-4
Multicast Listener Discovery version 2
multicast multilayer switching
Multicast Replication Mode Detection enhancement 31-11
multicast RPF 31-2
Multicast VPN 28-1
multilayer switch feature card
multiple path RPF check 35-2
native VLAN 10-10
NBAR 48-1
configuration, displaying 56-29
displaying configuration 56-29
enabling 56-15
destination host, specifying 56-28
destination TCP/UDP port, specifying 56-27
overview 56-7
protocol, specifying 56-28
source host and destination TCP/UDP port, specifying 56-27
multicast 56-14
overview 56-1
destination host filters 56-28
destination TCP/UDP port filters 56-27
protocol filters 56-28
NDE configuration, default 56-14
NDE version 8 56-10
NetFlow and NDE for Ingress Bridged IP Traffic 56-24
Netflow Multiple Export Destinations 56-24
NetFlow version 9 56-3
Network-Based Application Recognition 48-1
nonaggregate label 26-2, 26-4
non-RPF multicast 31-5
nonvolatile random-access memory
NSF 5-1
NSF with SSO does not support IPv6 multicast traffic. 5-1
saving settings 2-5
OIR 8-14
configuring 42-2
diagnostic sanity check 42-11
memory tests 42-10
overview 42-1
running tests 42-6
schedule switchover 42-10
test descriptions A-1
understanding 42-1
online diagnostic tests A-1
packet burst 43-16
packet capture 66-1
packet recirculation 48-12
CEF 29-2
IP MMLS and 31-3
multicast 38-3
PACLs. See private hosts feature
understanding 12-3
enable password 2-9
enable secret 2-9
line password 2-9
static enable password 2-8
TACACS+ 2-10
TACACS+ (caution) 2-10
encrypting 2-10
(caution) 2-11
recovering lost enable passwords 2-13
MSTP 20-43
PBR 1-4, 22-4
hardware features 26-4
MPLS guidelines and restrictions 26-7
MPLS label switching 26-1
MPLS supported commands 26-7
recirculation 26-4
supported Cisco IOS features 26-5
VPN supported commands 26-16
VPN switching 26-14
PFC compatibility with RSP720 4-1
PIM, IP MMLS and 31-10
designated router flooding 34-5
enabling globally 34-4
enabling in a VLAN 34-5
overview 34-3
police command 48-65
policing, QoS (definition) 48-108
policy 48-54
policy map 48-61
attaching to an interface 48-68
policy-map command 48-54, 48-62
port-based ACLs (PACLs). See private hosts feature
defined 52-2
RADIUS server 52-2
client, defined 52-2
configuration guidelines 52-7
initializing authentication of a client 52-12
manual reauthentication of a client 52-11
quiet period 52-12
RADIUS server 52-10
RADIUS server parameters on the switch 52-9
switch-to-authentication-server retransmission time 52-14
switch-to-client EAP-request frame retransmission time 52-14
switch-to-client frame-retransmission number 52-15
switch-to-client retransmission time 52-13
default configuration 52-6
described 52-1
device roles 52-2
displaying statistics 52-17
EAPOL-start frame 52-3
EAP-request/identity frame 52-3
EAP-response/identity frame 52-3
802.1X authentication 52-8, 52-9
periodic reauthentication 52-11
encapsulation 52-2
initiation and message exchange 52-3
method lists 52-8
authorization state and dot1x port-control command 52-4
authorized and unauthorized 52-4
resetting to default values 52-16
as proxy 52-2
RADIUS client 52-2
topologies, supported 52-5
switchport trunk encapsulation dot1q 12-6
command 12-10, 12-11
command example 12-11
port cost, STP 20-32
port debounce timer 8-13
See STP PortFast BPDU filtering
port mode 26-24
port negotiation 8-7
MSTP 20-42
port priority, STP 20-30
setting the debounce timer 8-13
aging 54-9, 54-10
configuring 54-4
default configuration 54-3
described 54-1
displaying 54-11
enable sticky secure MAC address 54-8
violations 54-2
Port Security is supported on trunks 54-4, 54-7, 54-9
port security MAC move 54-2
port security on PVLAN ports 54-3
Port Security with Sticky Secure MAC Addresses 54-2
enabling/disabling redundancy 59-2
overview 59-1
powering modules up or down 59-3
system power requirements, nine-slot chassis 59-5
primary links 11-1
primary VLANs 15-2
overriding CoS 16-7, 16-8
priority-rate propagation, IP subscriber 24-5, 24-25, 24-26
private-hosts command 39-14
command reference 39-13
configuration guidelines 39-5, 39-6
configuring (detailed steps) 39-10
configuring (summary) 39-9
debug fm private-hosts command 39-31
debug private-hosts command 39-32
isolating hosts in a VLAN 39-2
multicast operation 39-9
overview 39-1
port ACLs (PACLs) 39-4
port types 39-3
private-hosts command 39-14
private-hosts mac-list command 39-15
private-hosts mode command 39-17
private-hosts promiscuous command 39-19
private-hosts vlan-list command 39-21
protocol-independent MAC ACLs 39-1
restricting traffic flow with PACLs 39-3
show fm private-hosts command 39-23
show private-hosts access-lists command 39-26
show private-hosts configuration command 39-28
show private-hosts interface configuration command 39-29
show private-hosts mac-list command 39-30
spoofing protection 39-9
private-hosts mac-list command 39-15
private-hosts mode command 39-17
private-hosts promiscuous command 39-19
private-hosts vlan-list command 39-21
private VLANs 15-1
across multiple switches 15-5
and SVIs 15-6
benefits of 15-2
community VLANs 15-2, 15-3
configuration guidelines 15-7, 15-9, 15-11
configuring 15-11
host ports 15-14
pomiscuous ports 15-15
routing secondary VLAN ingress traffic 15-13
secondary VLANs with primary VLANs 15-12
VLANs as private 15-11
end station access to 15-4
IP addressing 15-4
isolated VLANs 15-2, 15-3
monitoring 15-16
community 15-3
configuration guidelines 15-9
isolated 15-3
promiscuous 15-3
primary VLANs 15-2
secondary VLANs 15-2
subdomains 15-2
traffic in 15-6
changing default 2-12
multiple levels 2-11
privilege level 2-11
exiting 2-12
logging in 2-12
global parameters, configuring 2-2
using configuration mode 2-3 to 2-4
promiscuous ports 15-3
See Layer 2 protocol tunneling 18-1
See Rapid-PVST 20-17
class of service (CoS), definition 48-107
DSCP (definition) 48-107
IP precedence 48-108
marking 48-108
policing 48-108
Type of Service (ToS) 48-108
QoS, per-subscriber 24-4
QoS classification (definition)
classification 48-107
congestion avoidance 48-107
and ToS final L3 Switching Engine values 48-11
and ToS final values from L3 Switching Engine 48-11
port value, configuring 48-79
QoS default configuration 48-97, 49-2
definition 48-107
internal values 48-9
maps, configuring 48-74
configuring 48-79, 48-84
QoS enhancements, RSP720 4-4
scheduling 48-97
scheduling, congestion avoidance, and marking 48-11, 48-13
classification, marking, scheduling, and congestion avoidance 48-6
QoS final L3 Switching Engine CoS and ToS values 48-11
QoS internal DSCP values 48-9
classification, marking, and policing 48-9
feature summary 48-15
QoS labels (definition) 48-108
CoS values to DSCP values 48-71, 48-74
DSCP markdown values 48-27, 48-75, 50-16
DSCP mutation 48-70, 50-29
DSCP values to CoS values 48-77
IP precedence values to DSCP values 48-75
QoS markdown 48-20
definition 48-108
trusted ports 48-14
untrusted ports 48-14
marking 48-17
QoS multilayer switch feature card 48-17
feature summary 48-13
QoS out of profile 48-19
definition 48-108
microflow, enabling for nonrouted traffic 48-48
aggregate 48-17
creating 48-53
microflow 48-17
trust state 48-77
QoS port-based or VLAN-based 48-49
transmit, allocating bandwidth between 48-94
QoS receive queue 48-8, 48-90, 48-92
drop thresholds 48-22
QoS scheduling (definition) 48-108
QoS statistics data export 49-1
configuring 49-2
configuring destination host 49-7
configuring time interval 49-6, 49-9
and CoS final values from L3 Switching Engine 48-11
definition 48-108
QoS traffic flow through QoS features 48-4
size ratio 48-95, 48-96
QoS transmit queues 48-23, 48-87, 48-88, 48-91
port keyword 48-14, 48-15
port keyword 48-14, 48-15
port keyword 48-14, 48-15
QoS untrusted port keyword 48-14, 48-15
QoS VLAN-based or port-based 48-10, 48-49
queries, IGMP 33-3
queries, MLDv2 32-4
dual-priority (IP subscriber) 24-5, 24-25
Radius accounting, per-subscriber 24-4
rapid convergence 20-13
enabling 20-36
overview 20-17
recirculation 26-4, 48-12
reduced MAC address 20-2
redundancy (NSF) 5-1
BGP 5-13
CEF 5-13
EIGRP 5-18
IS-IS 5-15
OSPF 5-14
configuring multicast NSF with SSO 5-12
configuring supervisor engine 5-10
routing protocols 5-4
redundancy (RPR+) 7-1
configuring 7-6
configuring supervisor engine 7-5
displaying supervisor engine configuration 7-7
redundancy command 7-6
route processor redundancy plus 7-3
redundancy command 5-11
related documentation 1-lxi
reload command 2-16, 2-17
Remote source-route bridging (RSRB) 22-1
Replication Mode Detection 31-11
report, MLD 32-4
CEF 29-2
IP MMLS 31-3
RIF cache monitoring 8-15
rommon command 2-17
boot process and 2-14
root bridge, STP 20-28
MSTP 20-40
Route Switch Processor 720 (RSP720)
chassis support 4-1
feature support 4-2
flash memory 4-6
hardware components 4-2
high availability 4-3
IPv6 ACL enhancements 4-3
load balancing on GE bundles 4-4
overview 4-1
packet fragmentation over GRE tunnels 4-4
performance improvements 4-2
PFC compatibility 4-1
ports 4-6
QoS enhancements 4-4
rate-limiting of unknown unicast packets 4-3
scalability 4-3
switching modes 4-7
unsupported features 4-5
routing table, multicast 31-20
failure 31-5
multicast 31-2
non-RPF multicast 31-5
unicast 35-2
RPR and RPR+ support IPv6 multicast traffic 7-1
active topology 20-12
format 20-15
processing 20-16
designated port, defined 20-12
designated switch, defined 20-12
interoperability with IEEE 802.1D
described 20-25
restarting migration process 20-49
topology changes 20-17
overview 20-12
described 20-12
synchronized 20-14
proposal-agreement handshake process 20-13
described 20-13
edge ports and Port Fast 20-13
point-to-point links 20-13, 20-47
root ports 20-13
root port, defined 20-12
SAID 14-6
sample configuration 2-4
description 56-8
saving the configuration file 2-5
secondary VLANs 15-2
Secure MAC Address Aging Type 54-10
configuring 35-1, 36-1, 43-1
security, port 54-1
security ACLs, per-subscriber 24-4
security precautions with Flash memory card 2-18
description 64-25
description 64-26
service instance 57-30
service-policy command 48-54
service-policy input command 48-50, 48-68, 48-71, 48-73, 50-29
service-provider network, MSTP and RSTP 20-18
set power redundancy enable/disable command 59-2
short pipe mode, configuring 50-34
show boot command 2-19
show catalyst6000 chassis-mac-address command 20-3
show ciscoview package command 1-3
show ciscoview version command 1-3
show configuration command 8-14
show eobc command 8-15
show fm private-hosts command 39-23
show hardware command 8-2
show ibc command 8-15
show interfaces command 8-2, 8-11, 8-14, 8-15, 10-7, 10-12
displaying, interface type numbers 8-2
displaying, speed and duplex mode 8-8
displaying NDE export flow IP address and UDP port 56-26
displaying IP MMLS interfaces 31-18
displaying IP multicast routing table 31-20
displaying IP MMLS router configuration 31-18
show mls aging command 56-21
show mls entry command 29-5
show mls ip multicast group command
displaying IP MMLS group 31-21, 31-24
show mls ip multicast interface command
displaying IP MMLS interface 31-21, 31-24
show mls ip multicast source command
displaying IP MMLS source 31-21, 31-24
show mls ip multicast statistics command
displaying IP MMLS statistics 31-21, 31-24
displaying IP MMLS configuration 31-21, 31-24
show mls nde command 56-29
displaying NDE flow IP address 56-26
displaying IP MLS configuration 56-20
show module command 7-7
show private-hosts access-lists command 39-26
show private-hosts configuration command 39-28
show private-hosts interface configuration command 39-29
show private-hosts mac-list command 39-30
show protocols command 8-15
show rif command 8-15
show running-config command 2-4, 8-14, 8-15
show startup-config command 2-5
show version command 2-3, 2-17, 8-15
slot number, description 8-1
smart call home 64-1
description 64-2
destination profile (note) 64-4
registration requirements 64-2
service contract requirements 64-3
Transport Gateway (TG) aggregation point 64-2
smart call home registration 64-2
support and documentation 1-1
upgrading router 6-8
software configuration register functions 2-14 to 2-17
software images, Release 12.2SRB C-1
call home event format 64-25
source-only-ip flow mask 56-3
source specific multicast with IGMPv3, IGMP v3lite, and URD 31-9
configuration guidelines 57-6
configuring 57-11
sources 57-15, 57-19, 57-25, 57-27
VLAN filtering 57-34
overview 57-1
SPAN Destination Port Permit Lists 57-14
command 21-13
command example 21-13, 21-14
command 20-32
command example 20-32, 20-33
command 21-8, 21-9
command example 21-8
spanning-tree portfast bpdu-guard
command 21-11
command 20-30, 20-31
spanning-tree protocol for bridging 22-2
command 21-12
command example 21-12
command 20-27, 20-29, 21-14
command example 20-27, 20-29
command 20-32
spanning-tree vlan forward-time
command 20-35
command example 20-35
command 20-34
command example 20-34
command 20-35
command example 20-36
spanning-tree vlan port-priority
command 20-30
command example 20-31
command 20-33
command example 20-34
configuring interface 8-5
speed command 3-2, 8-6
standby link 11-1
standby links 11-1
static route, configuring 2-5
802.1X 52-17
Sticky ARP 43-41
sticky ARP 43-41
Sticky secure MAC addresses 54-8, 54-9
configuring 20-25
bridge priority 20-33
enabling 20-26, 20-28
forward-delay time 20-35
hello time 20-34
maximum aging time 20-35
port cost 20-32
port priority 20-30
root bridge 20-28
secondary root switch 20-29
defaults 20-26
EtherChannel 12-5
understanding 20-1
802.1Q Trunks 20-11
Blocking State 20-7
BPDUs 20-3
disabled state 20-10
forwarding state 20-9
learning state 20-8
listening state 20-7
overview 20-2
port states 20-5
protocol timers 20-4
root bridge election 20-4
topology 20-4
configuring 21-13
adding a switch 21-7
command 21-13
command example 21-13, 21-14
understanding 21-4
configuring 21-11
spanning-tree portfast bpdu-guard
command 21-11
understanding 21-2
STP bridge ID 20-2
STP EtherChannel guard 21-6
configuring 21-14
overview 21-6
configuring 21-10
BPDU filtering 21-2
configuring 21-8
command 21-8, 21-9
command example 21-8
understanding 21-2
STP root guard 21-6, 21-14
configuring 21-12
command 21-12
command example 21-12
understanding 21-3
subdomains, private VLAN 15-2
subscribers. See IP subscriber awareness
configuring 2-1
default configuration 2-1
environmental monitoring 59-10
redundancy 5-1, 7-1
ROM monitor 2-14
startup configuration 2-13
static routes 2-5
synchronizing configurations 5-19, 7-7
Supervisor Engine 2, no longer supported
Supervisor Engine 32 9-1
flash memory 9-1
ports 9-2
supported chassis 9-1
configuring 5-10, 7-5
displaying redundancy configuration 7-7
switch fabric functionality 3-2, 4-6
configuring 3-4, 4-8
monitoring 3-4, 4-9
configuring 10-13
example 10-12
show interfaces 8-11, 10-7, 10-12
switchport access vlan 10-10, 10-13
example 10-14
switchport mode access 10-4, 10-13
example 10-14
switchport mode dynamic 10-9
switchport mode dynamic auto 10-4
switchport mode dynamic desirable 10-4
default 10-5
example 10-12
switchport mode trunk 10-4, 10-9
switchport nonegotiate 10-4
switchport trunk allowed vlan 10-11
switchport trunk encapsulation 10-8
switchport trunk encapsulation dot1q 10-3
example 10-12
switchport trunk encapsulation isl 10-3
switchport trunk encapsulation negotiate 10-3
default 10-5
switchport trunk native vlan 10-10
switchport trunk pruning vlan 10-11
MSTP 20-44
foreground execution 61-2
overview 61-1
running 61-2
viewing 61-2
configuration 2-14 to 2-17
settings at startup 2-15
configuring global parameters 2-2
System Hardware Capacity 59-5
determining if and how to load 2-15
loading from Flash 2-18
TACACS+ 35-1, 36-1, 43-1
TCP Intercept 35-2
checking cable connectivity 8-16
enabling and disabling test 8-16
guidelines 8-16
and ARP 62-2
and CDP 62-1
described 62-1
IP addresses and subnets 62-2
MAC addresses and VLANs 62-2
multicast traffic 62-2
multiple devices on a port 62-2
unicast traffic 62-1
usage guidelines 62-1
traffic flood blocking 47-1
broadcast 46-4
described 46-1
monitoring 46-6
thresholds 46-1
translational bridge numbers (defaults) 14-6
trunks 10-2
802.1Q Restrictions 10-5
allowed VLANs 10-11
configuring 10-7
default interface configuration 10-7
default VLAN 10-10
different VTP domains 10-3
encapsulation 10-3
native VLAN 10-10
to non-DTP device 10-4
VLAN 1 minimization 10-11
trustpoint 64-3
tunneling 50-4, 50-31
See 802.1Q 17-1
Type of Service (ToS) 48-108
UDE 25-1
configuration 25-3
overview 25-2
UDE and UDLR 25-1
restrictions 24-7, 69-2
default configuration 55-3
globally 55-3
on ports 55-4
overview 55-1
UDLR 25-1
back channel 25-1
configuration 25-6
(example) 25-7
ARP and NHRP 25-3
UDLR (unidirectional link routing)
unauthorized ports with 802.1X 52-4
Unicast and Multicast Flood Blocking 47-1
unicast flood blocking 47-1
unicast RPF 35-2
example of setting 25-5
UniDirectional Link Detection Protocol
configuring 50-39
upgrade guidelines 26-20
URD 31-9
User-Based Rate Limiting 48-19, 48-66
VACLs 38-1
configuring 38-4
examples 38-9
Layer 3 VLAN interfaces 38-8
Layer 4 port operations 36-5
configuration example 38-11
configuring 38-10
restrictions 38-10
MAC address based 38-4
multicast packets 38-3
overview 38-1
SVIs 38-8
WAN interfaces 38-1
version 8 (NDE) 56-10
command 14-11, 14-13, 56-18, 57-19
command example 14-12
VLAN-based QoS filtering 48-56
VLAN-bridge spanning-tree protocol 22-2
command 14-11, 14-13, 56-18, 57-19
command 14-16, 14-17
command example 14-18
VLAN mode 26-24
allowed on trunk 10-11
configuration guidelines 14-8
configuring 14-1
configuring (tasks) 14-10
defaults 14-6, 14-8
extended range 14-2
ID (default) 14-6
interface assignment 14-13
name (default) 14-6
normal range 14-2
reserved range 14-2
support for 4,096 VLANs 14-2
token ring 14-3
understanding 10-2
understanding 14-1
VLAN 1 minimization 10-11
VTP domain 14-2
command example 14-16, 14-17
Cisco 7960 phone, port connections 16-1
configuration guidelines 16-4
configuring IP phone for data traffic
override CoS of incoming frame 16-7, 16-8
configuring ports for voice traffic in
802.1Q frames 16-5
connecting to an IP phone 16-5
default configuration 16-4
overview 16-1
configuration example 26-16
guidelines and restrictions 26-15
advertisements 13-3
client, configuring 13-11
configuration guidelines 13-6
default configuration 13-6
disabling 13-11
domains 13-2, 70-1
VLANs 14-2
client 13-2
server 13-2
transparent 13-2
monitoring 13-13
overview 13-1, 70-1
configuration 10-11
configuring 13-9
overview 13-5
server, configuring 13-11
statistics 13-13
transparent mode, configuring 13-11
enabling 13-10
overview 13-3
configuring on a router 60-2, 60-14
service groups 60-8
specifying protocol version 60-7
web browser interface 1-1
Web Cache Communication Protocol
description 60-5
web scaling 60-1
weighted round robin 48-94
WRR 48-94
xconnect command 26-20
Y.1731 Performance Monitoring 74-1
Feedback