Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

10-Gigabit Ethernet interfaces

configuration guidelines     11-16

defined     11-6

802.1D

See STP

802.1Q

and trunk ports     11-3

configuration limitations     13-19

encapsulation     13-16

native VLAN for untagged traffic     13-23

tunneling

compatibility with other features     17-6

defaults     17-4

described     17-1

tunnel ports with other features     17-6

802.1s

See MSTP

802.1w

See RSTP

802.1x

See port-based authentication

802.3ad

See EtherChannel

802.3af

See PoE

802.3z flow control     11-19

A

abbreviating commands     2-3

ABRs     35-25

access-class command     32-20

access control entries

See ACEs

access-denied response, VMPS     13-28

access groups

applying ACLs to interfaces     32-21

IP     32-21

Layer 2     32-21

Layer 3     32-21

accessing stack members     5-23

access lists

See ACLs

access ports

and Layer 2 protocol tunneling     17-11

defined     11-3

accounting

with 802.1x     10-5, 10-22

with RADIUS     9-28

with TACACS+     9-11, 9-17

ACEs

and QoS     33-7

defined     32-2

Ethernet     32-2

IP     32-2

ACLs

ACEs     32-2

any keyword     32-13

applying

on bridged packets     32-39

on multicast packets     32-40

on routed packets     32-39

on switched packets     32-38

time ranges to     32-17

ACLs (continued)

applying (continued)

to an interface     32-20

to QoS     33-7

classifying traffic for QoS     33-43

comments in     32-19

compiling     32-22

configuring with VLAN maps     32-37

defined     32-1, 32-8

examples of     32-22, 33-43

extended IP

configuring for QoS classification     33-45

creating     32-10

matching criteria     32-8

hardware and software handling     32-22

host keyword     32-13

IP

applying to interfaces     32-20

creating     32-8

fragments and QoS guidelines     33-34

implicit deny     32-10, 32-14, 32-16

implicit masks     32-10

matching criteria     32-8

named     32-15

terminal lines, setting on     32-19

undefined     32-21

violations, logging     32-16

limiting actions     32-38

logging messages     32-10

log keyword     32-16

MAC extended     32-27, 33-46

matching     32-8, 32-21

monitoring     32-41

named     32-15

number per QoS class map     33-34

numbers     32-8

port     32-2

precedence of     32-2

QoS     33-7, 33-43

ACLs (continued)

resequencing entries     32-15

router     32-2

standard IP

configuring for QoS classification     33-44

creating     32-9

matching criteria     32-8

supported features     32-22

support for     1-7

time ranges     32-17

unsupported features     32-7

using router ACLs with VLAN maps     32-37

VLAN maps

configuration guidelines     32-31

configuring     32-30

active links     21-1

active router     37-1

address aliasing     24-2

addresses

displaying the MAC address table     7-27

dynamic

accelerated aging     18-9

changing the aging time     7-22

default aging     18-9

defined     7-20

learning     7-21

removing     7-23

MAC, discovering     7-27

multicast

group address range     38-3

STP address management     18-9

static

adding and removing     7-25

defined     7-20

address resolution     7-27, 35-9

Address Resolution Protocol

See ARP

adjacency tables, with CEF     35-61

administrative distances

defined     35-72

OSPF     35-31

routing protocol defaults     35-63

advanced IP services image     1-1, 36-1

advertisements

CDP     26-1

RIP     35-20

VTP     13-19, 14-3

aggregatable global unicast addresses     36-3

aggregate addresses, BGP     35-55

aggregated ports

See EtherChannel

aggregate policers     33-59

aggregate policing     1-8

aggregator template     5-10, 8-1

aging, accelerating     18-9

aging time

accelerated

for MSTP     19-21

for STP     18-9, 18-23

MAC address table     7-22

maximum

for MSTP     19-22

for STP     18-23

alarms, RMON     29-3

allowed-VLAN list     13-21

area border routers

See ABRs

ARP

configuring     35-10

defined     1-5, 7-27, 35-10

encapsulation     35-11

static cache configuration     35-10

table

address resolution     7-27

managing     7-27

ASBRs     35-25

AS-path filters, BGP     35-50

asymmetrical links, and 802.1Q tunneling     17-4

attributes, RADIUS

vendor-proprietary     9-31

vendor-specific     9-29

audience     xxix

authentication

EIGRP     35-38

HSRP     37-9

local mode with AAA     9-36

NTP associations     7-5

RADIUS

key     9-21

login     9-23

TACACS+

defined     9-11

key     9-13

login     9-14

See also port-based authentication

authentication keys, and routing protocols     35-73

authoritative time source, described     7-2

authorization

with RADIUS     9-27

with TACACS+     9-11, 9-16

authorized ports with 802.1x     10-4

autoconfiguration     3-3

automatic advise (auto-advise) in switch stacks     5-12

automatic copy (auto-copy) in switch stacks     5-12

automatic QoS

See QoS

automatic upgrades (auto-upgrade) in switch stacks     5-12

autonegotiation

duplex mode     1-3

interface configuration guidelines     11-17

mismatches     41-12

autonomous system boundary routers

See ASBRs

autonomous systems, in BGP     35-44

Auto-RP, described     38-5

autosensing, port speed     1-3

auxiliary VLAN

See voice VLAN

availability, features     1-5

B

BackboneFast

described     20-7

disabling     20-17

enabling     20-16

support for     1-6

backup interfaces

See Flex Links

backup links     21-1

banners

configuring

login     7-19

message-of-the-day login     7-18

default configuration     7-18

when displayed     7-18

BGP

aggregate addresses     35-55

aggregate routes, configuring     35-55

CIDR     35-55

clear commands     35-59

community filtering     35-52

configuring neighbors     35-54

default configuration     35-42

described     35-41

enabling     35-44

monitoring     35-59

multipath support     35-47

neighbors, types of     35-44

path selection     35-47

peers, configuring     35-54

prefix filtering     35-51

resetting sessions     35-46

route dampening     35-58

route maps     35-49

BGP (continued)

route reflectors     35-57

routing domain confederation     35-56

show commands     35-59

supernets     35-55

support for     1-9

Version 4     35-41

binding cluster group and HSRP group     37-11

binding database

address, DHCP server

See DHCP, Cisco IOS server database

DHCP snooping

See DHCP snooping binding database

bindings

address, Cisco IOS DHCP server     22-5

DHCP snooping database     22-6

IP source guard     22-15

binding table, DHCP snooping

See DHCP snooping binding database

blocking packets     25-6

booting

boot loader, function of     3-2

boot process     3-2

manually     3-13

specific image     3-13

boot loader

accessing     3-14

described     3-2

environment variables     3-14

prompt     3-14

trap-door mechanism     3-2

bootstrap router (BSR), described     38-5

Border Gateway Protocol

See BGP

BPDU

error-disabled state     20-3

filtering     20-3

RSTP format     19-10

BPDU filtering

described     20-3

disabling     20-15

enabling     20-14

support for     1-6

BPDU guard

described     20-3

disabling     20-14

enabling     20-13

support for     1-6

bridged packets, ACLs on     32-39

bridge groups

See fallback bridging

bridge protocol data unit

See BPDU

broadcast flooding     35-17

broadcast packets

directed     35-14

flooded     35-14

broadcast storm-control command     25-4

broadcast storms     25-1, 35-14

C

cables, monitoring for unidirectional links     27-1

candidate switch

defined     6-3

requirements     6-3

See also command switch, cluster standby group, and member switch

CA trustpoint

configuring     9-45

defined     9-42

caution, described     xxx

CDP

and trusted boundary     33-40

configuring     26-2

default configuration     26-2

described     26-1

CDP (continued)

disabling for routing device     26-3 to  26-4

enabling and disabling

on an interface     26-4

on a switch     26-3

Layer 2 protocol tunneling     17-8

monitoring     26-5

overview     26-1

power negotiation extensions     11-6

support for     1-5

switch stack considerations     26-2

transmission timer and holdtime, setting     26-2

updates     26-2

CEF

defined     35-60

distributed     35-61

enabling     35-61

IPv6     36-15

CGMP

as IGMP snooping learning method     24-8

clearing cached group entries     38-50

enabling server support     38-33

joining multicast group     24-3

overview     38-7

server support only     38-7

switch support of     1-4

CIDR     35-55

CipherSuites     9-43

Cisco 7960 IP Phone     16-1

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco intelligent power management     11-6

Cisco IOS DHCP server

See DHCP, Cisco IOS DHCP server

Cisco IOS File System

See IFS

Cisco Network Assistant

See Network Assistant

Cisco Networking Services

See IE2100

Cisco StackWise technology     1-3

See also stacks, switch

CiscoWorks 2000     1-4, 31-4

classless interdomain routing

See CIDR

classless routing     35-8

class maps for QoS

configuring     33-47

described     33-7

displaying     33-79

class of service

See CoS

clearing interfaces     11-27

CLI

abbreviating commands     2-3

command modes     2-1

described     1-4

editing features

enabling and disabling     2-6

keystroke editing     2-6

wrapped lines     2-8

error messages     2-4

filtering command output     2-8

getting help     2-3

history

changing the buffer size     2-5

described     2-4

disabling     2-5

recalling commands     2-5

managing clusters     6-4

no and default forms of commands     2-4

client mode, VTP     14-3

clock

See system clock

cluster requirements     xxxi

clusters, switch

benefits     1-2

described     6-1

managing

through CLI     6-4

through SNMP     6-5

planning considerations

CLI     6-4

SNMP     6-5

See also Getting Started with Cisco Network Assistant

cluster standby group

and HSRP group     37-11

requirements     6-2

Coarse Wave Division Multiplexer

See CWDM SFPs

command-line interface

See CLI

command modes     2-1

commands

abbreviating     2-3

no and default     2-4

commands, setting privilege levels     9-8

command switch

configuration conflicts     41-12

defined     6-2

password privilege levels     6-4

recovery

from command-switch failure     41-8

from lost member connectivity     41-12

replacing

with another switch     41-11

with cluster member     41-9

requirements     6-2

See also candidate switch, cluster standby group, member switch, and standby command switch

community list, BGP     35-53

community ports     15-2

community strings

configuring     31-8

for cluster switches     31-4

overview     31-4

community VLANs     15-2, 15-3

compatibility, feature     25-11

compatibility, software

See stacks, switch

config.text     3-12

configuration, initial

defaults     1-11

Express Setup     1-2

See also getting started guide and hardware installation guide

configuration conflicts, recovering from lost member connectivity     41-12

configuration examples, network     1-13

configuration files

clearing the startup configuration     B-19

creating using a text editor     B-10

default name     3-12

deleting a stored configuration     B-19

described     B-8

downloading

automatically     3-12

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

guidelines for creating and using     B-9

invalid combinations when copying     B-5

limiting TFTP server access     31-15

obtaining with DHCP     3-7

password recovery disable considerations     9-5

specifying the filename     3-12

system contact and location information     31-15

types and location     B-9

configuration files (continued)

uploading

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-14

using RCP     B-18

using TFTP     B-11

configuration settings, saving     3-10

configure terminal command     11-11

config-vlan mode     2-2, 13-7

conflicts, configuration     41-12

connections, secure remote     9-38

connectivity problems     41-14, 41-16, 41-17

consistency checks in VTP Version 2     14-4

console port, connecting to     2-9

conventions

command     xxx

for examples     xxx

publication     xxx

text     xxx

corrupted software, recovery steps with Xmodem     41-2

CoS

in Layer 2 frames     33-2

override priority     16-6

trust priority     16-6

CoS input queue threshold map for QoS     33-17

CoS output queue threshold map for QoS     33-20

CoS-to-DSCP map for QoS     33-61

counters, clearing interface     11-27

crashinfo file     41-24

cross-stack EtherChannel

configuration guidelines     34-12

configuring

on Layer 2 interfaces     34-12

on Layer 3 physical interfaces     34-16

described     34-2

illustration     34-3

support for     1-5

cross-stack UplinkFast, STP

described     20-5

disabling     20-16

enabling     20-16

fast-convergence events     20-7

Fast Uplink Transition Protocol     20-6

normal-convergence events     20-7

support for     1-6

cryptographic software image

Kerberos     9-32

SSH     9-37

SSL     9-42

switch stack considerations     5-2, 5-17, 9-38

CWDM SFPs     1-24

D

daylight saving time     7-13

dCEF

in the switch stack     35-60

debugging

enabling all system diagnostics     41-21

enabling for a specific feature     41-20

redirecting error message output     41-21

using commands     41-20

default commands     2-4

default configuration

802.1Q tunneling     17-4

802.1x     10-11

auto-QoS     33-21

banners     7-18

BGP     35-42

booting     3-12

CDP     26-2

DHCP     22-7

DHCP option 82     22-7

DHCP snooping     22-7

DHCP snooping binding database     22-8

DNS     7-17

default configuration (continued)

dynamic ARP inspection     23-5

EIGRP     35-35

EtherChannel     34-10

fallback bridging     40-4

Flex Links     21-2

HSRP     37-5

IGMP     38-27

IGMP filtering     24-21

IGMP snooping     24-7

IGMP throttling     24-21

initial switch information     3-3

IP addressing, IP routing     35-6

IP multicast routing     38-8

IP source guard     22-16

IPv6     36-10

Layer 2 interfaces     11-15

Layer 2 protocol tunneling     17-11

MAC address table     7-22

MSDP     39-4

MSTP     19-13

MVR     24-16

NTP     7-4

optional spanning-tree configuration     20-12

OSPF     35-26

password and privilege level     9-2

PIM     38-8

private VLANs     15-7

RADIUS     9-20

RIP     35-21

RMON     29-3

RSPAN     28-11

SDM template     8-5

SNMP     31-6

SPAN     28-11

SSL     9-44

standard QoS     33-32

STP     18-13

switch stacks     5-20

default configuration (continued)

system message logging     30-4

system name and prompt     7-15

TACACS+     9-13

UDLD     27-4

VLAN, Layer 2 Ethernet interfaces     13-19

VLANs     13-8

VMPS     13-29

voice VLAN     16-3

VTP     14-7

default gateway     3-10, 35-12

default networks     35-63

default routes     35-63

default routing     35-3

deleting VLANs     13-10

description command     11-22

designing your network, examples     1-13

desktop template     5-10, 8-1

destination addresses, in ACLs     32-12

destination-IP address-based forwarding, EtherChannel     34-8

destination-MAC address forwarding, EtherChannel     34-8

detecting indirect link failures, STP     20-8

device     B-19

device discovery protocol     26-1

device manager

benefits     1-2

described     1-2, 1-4

in-band management     1-5

requirements     xxx

upgrading a switch     B-19

DHCP

Cisco IOS server database

configuring     22-13

default configuration     22-7

described     22-5

enabling

relay agent     22-9

server     22-9

DHCP-based autoconfiguration

client request message exchange     3-4

configuring

client side     3-4

DNS     3-6

relay device     3-7

server side     3-5

server-side     22-9

TFTP server     3-6

example     3-8

lease options

for IP address information     3-5

for receiving the configuration file     3-5

overview     3-3

relationship to BOOTP     3-4

relay support     1-5, 1-10

support for     1-5

DHCP binding database

See DHCP snooping binding database

DHCP binding table

See DHCP snooping binding database

DHCP option 82

circuit ID suboption     22-5

configuration guidelines     22-8

default configuration     22-7

displaying     22-14

forwarding address, specifying     22-10

helper address     22-10

overview     22-3

packet format, suboption

circuit ID     22-5

remote ID     22-5

remote ID suboption     22-5

DHCP snooping

accepting untrusted packets form edge switch     22-3, 22-11

and private VLANs     22-12

binding database

See DHCP snooping binding database

DHCP snooping (continued)

configuration guidelines     22-8

default configuration     22-7

displaying binding tables     22-14

message exchange process     22-4

option 82 data insertion     22-3

trusted interface     22-2

untrusted interface     22-2

untrusted messages     22-2

DHCP snooping binding database

adding bindings     22-13

binding file

format     22-6

location     22-6

bindings     22-6

clearing agent statistics     22-14

configuration guidelines     22-9

configuring     22-13

default configuration     22-7, 22-8

deleting

binding file     22-13

bindings     22-14

database agent     22-13

described     22-5

displaying     22-14

binding entries     22-14

status and statistics     22-14

enabling     22-13

entry     22-6

renewing database     22-14

resetting

delay value     22-13

timeout value     22-13

updating process     22-6

DHCP snooping binding table

See DHCP snooping binding database

Differentiated Services architecture, QoS     33-2

Differentiated Services Code Point     33-2

Diffusing Update Algorithm (DUAL)     35-34

directed unicast requests     1-5

directories

changing     B-4

creating and removing     B-4

displaying the working     B-4

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols     35-3

distribute-list command     35-71

DNS

and DHCP-based autoconfiguration     3-6

default configuration     7-17

displaying the configuration     7-18

in IPv6     36-4

overview     7-16

setting up     7-17

support for     1-5

documentation, related     xxx

document conventions     xxx

domain names

DNS     7-16

VTP     14-8

Domain Name System

See DNS

dot1q-tunnel switchport mode     13-18

double-tagged packets

802.1Q tunneling     17-2

Layer 2 protocol tunneling     17-10

downloading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

downloading (continued)

image files

deleting old image     B-23

preparing     B-22, B-25, B-29

reasons for     B-19

using CMS     1-2

using FTP     B-26

using HTTP     1-2, B-19

using Network Assistant     1-2

using RCP     B-31

using TFTP     B-22

using the device manager or Network Assistant     B-19

drop threshold for Layer 2 protocol packets     17-11

DSCP     1-8, 33-2

DSCP input queue threshold map for QoS     33-17

DSCP output queue threshold map for QoS     33-20

DSCP-to-CoS map for QoS     33-64

DSCP-to-DSCP-mutation map for QoS     33-65

DSCP transparency     33-40

DTP     1-6, 13-17

DUAL finite state machine, EIGRP     35-34

dual IPv4 and IPv6 templates     8-2, 36-9

dual protocol stacks

configuring     36-13

IPv4 and IPv6     36-9

SDM templates supporting     36-9

duplex mode, configuring     11-17

DVMRP

autosummarization

configuring a summary address     38-47

disabling     38-49

connecting PIM domain to DVMRP router     38-39

enabling unicast routing     38-43

interoperability

with Cisco devices     38-37

with Cisco IOS software     38-7

mrinfo requests, responding to     38-42

DVRMP (continued)

neighbors

advertising the default route to     38-41

discovery with Probe messages     38-37

displaying information     38-42

prevent peering with nonpruning     38-45

rejecting nonpruning     38-43

overview     38-7

routes

adding a metric offset     38-49

advertising all     38-49

advertising the default route to neighbors     38-41

caching DVMRP routes learned in report messages     38-43

changing the threshold for syslog messages     38-46

deleting     38-50

displaying     38-51

favoring one over another     38-49

limiting the number injected into MBONE     38-46

limiting unicast route advertisements     38-37

routing table     38-7

source distribution tree, building     38-7

support for     1-10

tunnels

configuring     38-39

displaying neighbor information     38-42

dynamic access ports

characteristics     13-3

configuring     13-30

defined     11-3

dynamic addresses

See addresses

dynamic ARP inspection

ARP cache poisoning     23-1

ARP requests, described     23-1

ARP spoofing attack     23-1

dynamic ARP inspection (continued)

clearing

log buffer     23-15

statistics     23-15

configuration guidelines     23-6

configuring

ACLs for non-DHCP environments     23-8

in DHCP environments     23-7

log buffer     23-12

rate limit for incoming ARP packets     23-4, 23-10

default configuration     23-5

denial-of-service attacks, preventing     23-10

described     23-1

DHCP snooping binding database     23-2

displaying

ARP ACLs     23-14

configuration and operating state     23-14

log buffer     23-15

statistics     23-15

trust state and rate limit     23-14

error-disabled state for exceeding rate limit     23-4

function of     23-2

interface trust states     23-3

log buffer

clearing     23-15

configuring     23-12

displaying     23-15

logging of dropped packets, described     23-5

man-in-the middle attack, described     23-2

network security issues and interface trust states     23-3

priority of ARP ACLs and DHCP snooping entries     23-4

rate limiting of ARP packets

configuring     23-10

described     23-4

error-disabled state     23-4

statistics

clearing     23-15

displaying     23-15

validation checks, performing     23-11

dynamic auto trunking mode     13-18

dynamic desirable trunking mode     13-18

Dynamic Host Configuration Protocol

See DHCP-based autoconfiguration

dynamic port VLAN membership

described     13-28

reconfirming     13-31

troubleshooting     13-33

types of connections     13-30

dynamic routing     35-3

Dynamic Trunking Protocol

See DTP

E

EBGP     35-40

editing features

enabling and disabling     2-6

keystrokes used     2-6

wrapped lines     2-8

EIGRP

authentication     35-38

components     35-34

configuring     35-36

default configuration     35-35

definition     35-34

interface parameters, configuring     35-37

monitoring     35-39

support for     1-9

elections

See stack master

EMI     1-1

enable password     9-4

enable secret password     9-4

encryption, CipherSuite     9-44

encryption for passwords     9-4

Enhanced IGRP

See EIGRP

enhanced multilayer image

See EMI

environment variables, function of     3-15

equal-cost routing     1-9, 35-62

error messages during command entry     2-4

EtherChannel

802.3ad, described     34-6

automatic creation of     34-5, 34-6

channel groups

binding physical and logical interfaces     34-4

numbering of     34-4

configuration guidelines     34-11

configuring

Layer 2 interfaces     34-12

Layer 3 physical interfaces     34-16

Layer 3 port-channel logical interfaces     34-15

default configuration     34-10

described     34-2

displaying status     34-23

forwarding methods     34-7, 34-18

interaction

with STP     34-11

with VLANs     34-12

LACP

described     34-6

displaying status     34-23

hot-standby ports     34-20

interaction with other features     34-7

modes     34-6

port priority     34-22

system priority     34-21

Layer 3 interface     35-5

load balancing     34-7, 34-18

logical interfaces, described     34-4

EtherChannel (continued)

PAgP

aggregate-port learners     34-19

compatibility with Catalyst 1900     34-19

described     34-5

displaying status     34-23

interaction with other features     34-6

learn method and priority configuration     34-19

modes     34-5

support for     1-4

port-channel interfaces

described     34-4

numbering of     34-4

port groups     11-5

stack changes, effects of     34-9

support for     1-4

EtherChannel guard

described     20-10

disabling     20-17

enabling     20-17

Ethernet VLANs

adding     13-9

defaults and ranges     13-8

modifying     13-9

EUI     36-3

events, RMON     29-3

examples

conventions for     xxx

network configuration     1-13

expedite queue for QoS     33-78

Express Setup     1-2

See also getting started guide

extended-range VLANs

configuration guidelines     13-13

configuring     13-12

creating     13-14

defined     13-1

extended system ID

MSTP     19-15

STP     18-4, 18-16

extended universal identifier

See EUI

Extensible Authentication Protocol over LAN     10-1

external BGP

See EBGP

external neighbors, BGP     35-44

F

failover support     1-5

fallback bridging

and protected ports     40-4

bridge groups

creating     40-4

described     40-2

displaying     40-11

function of     40-2

number supported     40-5

removing     40-5

bridge table

clearing     40-11

displaying     40-11

configuration guidelines     40-4

connecting interfaces with     11-9

default configuration     40-4

described     40-1

frame forwarding

flooding packets     40-2

forwarding packets     40-2

overview     40-1

protocol, unsupported     40-4

stack changes, effects of     40-3

STP

disabling on an interface     40-11

forward-delay interval     40-10

hello BPDU interval     40-9

fallback bridging (continued)

STP (continued)

interface priority     40-7

keepalive messages     18-2

maximum-idle interval     40-10

path cost     40-8

VLAN-bridge spanning-tree priority     40-7

VLAN-bridge STP     40-2

support for     1-9

SVIs and routed ports     40-1

unsupported protocols     40-4

VLAN-bridge STP     18-12

Fast Uplink Transition Protocol     20-6

features, incompatible     25-11

FIB     35-60

fiber-optic, detecting unidirectional links     27-1

files

copying     B-5

crashinfo

description     41-24

displaying the contents of     41-24

location     41-24

deleting     B-5

displaying the contents of     B-8

tar

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

file system

displaying available file systems     B-2

displaying file information     B-3

local file system names     B-1

network file system names     B-5

setting the default     B-3

filtering

in a VLAN     32-30

non-IP traffic     32-27

show and more command output     2-8

filtering show and more command output     2-8

filters, IP

See ACLs, IP

flash device, number of     B-1

Flex Links

configuration guidelines     21-2

configuring     21-3

default configuration     21-2

description     21-1

monitoring     21-3

flooded traffic, blocking     25-7

flow-based packet classification     1-8

flowcharts

QoS classification     33-6

QoS egress queueing and scheduling     33-18

QoS ingress queueing and scheduling     33-16

QoS policing and marking     33-10

flow control     1-3, 11-19

forward-delay time

MSTP     19-21

STP     18-23

Forwarding Information Base

See FIB

forwarding nonroutable protocols     40-1

FTP

accessing MIB files     A-3

configuration files

downloading     B-13

overview     B-12

preparing the server     B-13

uploading     B-14

image files

deleting old image     B-28

downloading     B-26

preparing the server     B-25

uploading     B-28

G

get-bulk-request operation     31-3

get-next-request operation     31-3, 31-4

get-request operation     31-3, 31-4

get-response operation     31-3

Gigabit modules

See SFPs

global configuration mode     2-2

guest VLAN and 802.1x     10-8

guide

audience     xxix

purpose of     xxix

guide mode     1-2

GUIs

See device manager and Network Assistant     1-4

H

hardware limitations and Layer 3 interfaces     11-24

hello time

MSTP     19-20

STP     18-22

help, for the command line     2-3

hierarchical policy maps     33-8

configuration guidelines     33-34

configuring     33-52

described     33-11

history

changing the buffer size     2-5

described     2-4

disabling     2-5

recalling commands     2-5

history table, level and number of syslog messages     30-10

host ports

configuring     15-12

kinds of     15-2

hosts, limit on dynamic ports     13-33

Hot Standby Router Protocol

See HSRP

HP OpenView     1-4

HSRP

authentication string     37-9

binding to cluster group     37-11

command-switch redundancy     1-1, 1-5

configuring     37-4

default configuration     37-5

definition     37-1

guidelines     37-5

monitoring     37-11

overview     37-1

priority     37-7

routing redundancy     1-9

support for ICMP redirect messages     37-11

switch stack considerations     37-4

timers     37-9

tracking     37-7

HTTP over SSL

see HTTPS

HTTPS     9-42

configuring     9-45

self-signed certificate     9-43

HTTP secure server     9-42

I

IBPG     35-40

ICMP

IPv6     36-4

redirect messages     35-12

support for     1-9

time-exceeded messages     41-18

traceroute and     41-18

unreachable messages     32-20

unreachables and ACLs     32-22

ICMP ping

executing     41-15

overview     41-14

ICMP Router Discovery Protocol

See IRDP

ICMPv6     36-4

IDS appliances

and ingress RSPAN     28-22

and ingress SPAN     28-15

IE2100

CNS embedded agents

described     4-5

enabling automated configuration     4-6

enabling configuration agent     4-9

enabling event agent     4-8

Configuration Registrar

configID, deviceID, hostname     4-3

configuration service     4-2

described     4-1

event service     4-3

IEEE 802.1p     16-1

ifIndex values, SNMP     31-5

IFS     1-5

IGMP

configuring the switch

as a member of a group     38-27

statically connected member     38-32

controlling access to groups     38-28

default configuration     38-27

deleting cache entries     38-51

displaying groups     38-51

fast switching     38-32

host-query interval, modifying     38-30

joining multicast group     24-3

join messages     24-3

leave processing, enabling     24-10

leaving multicast group     24-5

multicast reachability     38-27

overview     38-2

IGMP (continued)

queries     24-4

report suppression

described     24-5

disabling     24-12

support for     1-4

Version 1

changing to Version 2     38-29

described     38-3

Version 2

changing to Version 1     38-29

described     38-3

maximum query response time value     38-31

pruning groups     38-31

query timeout value     38-31

IGMP filtering

configuring     24-21

default configuration     24-21

described     24-20

monitoring     24-25

support for     1-4

IGMP groups

configuring filtering     24-24

setting the maximum number     24-23

IGMP profile

applying     24-22

configuration mode     24-21

configuring     24-22

IGMP snooping

and address aliasing     24-2

and stack changes     24-6

configuring     24-6

default configuration     24-7

definition     24-1

enabling and disabling     24-7

global configuration     24-7

Immediate Leave     24-5

in the switch stack     24-6

method     24-8

IGMP snooping (continued)

monitoring     24-13

querier

configuring     24-11

guidelines and restrictions     24-6

support for     1-4

VLAN configuration     24-8

IGMP throttling

configuring     24-24

default configuration     24-21

described     24-21

displaying action     24-25

IGP     35-25

Immediate Leave, IGMP

described     24-5

enabling     24-10

initial configuration

defaults     1-11

Express Setup     1-2

See also getting started guide and hardware installation guide

Intelligence Engine 2100 Series CNS Agents

See IE2100

interface

number     11-10

range macros     11-13

interface command     11-10 to  11-11

interface configuration mode     2-2

interfaces

configuration guidelines

10-Gigabit Ethernet     11-16

duplex and speed     11-17

configuring

duplex mode     11-17

procedure     11-11

speed     11-17

configuring for IPv4 and IPv6     36-13

counters, clearing     11-27

described     11-22

interfaces (continued)

descriptive name, adding     11-22

displaying information about     11-26

flow control     11-19

management     1-4

monitoring     11-26

naming     11-22

physical, identifying     11-10

range of     11-11

restarting     11-27, 11-28

shutting down     11-27

status     11-26

supported     11-10

types of     11-1

interfaces range macro command     11-13

interface types     11-10

Interior Gateway Protocol

See IGP

internal BGP

See IBGP

internal neighbors, BGP     35-44

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Internet Protocol version 6

See IPv6

Inter-Switch Link

See ISL

inter-VLAN routing     1-9, 35-2

Intrusion Detection System

See IDS appliances

ip access group command     32-21

IP ACLs

extended, creating     32-10

for QoS classification     33-7

implicit deny     32-10, 32-14, 32-16

implicit masks     32-10

logging     32-16

IP ACLs (continued)

named     32-15

standard, creating     32-9

undefined     32-21

virtual terminal lines, setting on     32-19

IP addresses

128-bit     36-2

candidate or member     6-3

classes of     35-6

command switch     6-2

default configuration     35-6

discovering     7-27

for IP routing     35-5

IPv6     36-2

MAC address association     35-9

monitoring     35-18

See also IP information

IP broadcast address     35-17

ip cef distributed command     35-61

IP directed broadcasts     35-15

ip igmp profile command     24-21

IP information

assigned

manually     3-10

through DHCP-based autoconfiguration     3-3

default configuration     3-3

IP multicast routing

addresses

all-hosts     38-3

all-multicast-routers     38-3

host group address range     38-3

administratively-scoped boundaries, described     38-35

and IGMP snooping     24-1

Auto-RP

adding to an existing sparse-mode cloud     38-14

benefits of     38-14

clearing the cache     38-51

configuration guidelines     38-10

filtering incoming RP announcement messages     38-17

IP multicast routing (continued)

Auto_RP (continued)

overview     38-5

preventing candidate RP spoofing     38-17

preventing join messages to false RPs     38-16

setting up in a new internetwork     38-14

using with BSR     38-22

bootstrap router

configuration guidelines     38-10

configuring candidate BSRs     38-20

configuring candidate RPs     38-21

defining the IP multicast boundary     38-19

defining the PIM domain border     38-18

overview     38-5

using with Auto-RP     38-22

Cisco implementation     38-2

configuring

basic multicast routing     38-10

IP multicast boundary     38-35

default configuration     38-8

enabling

multicast forwarding     38-11

PIM mode     38-11

group-to-RP mappings

Auto-RP     38-5

BSR     38-5

MBONE

deleting sdr cache entries     38-51

described     38-34

displaying sdr cache     38-52

enabling sdr listener support     38-34

limiting DVMRP routes advertised     38-46

limiting sdr cache entry lifetime     38-35

SAP packets for conference session announcement     38-34

Session Directory (sdr) tool, described     38-34

IP multicast routing (continued)

monitoring

packet rate loss     38-52

peering devices     38-52

tracing a path     38-52

multicast forwarding, described     38-6

PIMv1 and PIMv2 interoperability     38-9

protocol interaction     38-2

reverse path check (RPF)     38-6

routing table

deleting     38-51

displaying     38-51

RP

assigning manually     38-12

configuring Auto-RP     38-14

configuring PIMv2 BSR     38-18

monitoring mapping information     38-23

using Auto-RP and BSR     38-22

stacking

stack master functions     38-8

stack member functions     38-8

statistics, displaying system and network     38-51

See also CGMP

See also DVMRP

See also IGMP

See also PIM

IP phones

and QoS     16-1

automatic classification and queueing     33-21

configuring     16-4

ensuring port security with QoS     33-39

trusted boundary for QoS     33-39

IP precedence     33-2

IP-precedence-to-DSCP map for QoS     33-62

IP protocols

in ACLs     32-12

routing     1-9

IP routes, monitoring     35-74

IP routing

connecting interfaces with     11-9

disabling     35-19

enabling     35-19

IP source guard

and 802.1x     22-16

and DHCP snooping     22-15

and EtherChannels     22-16

and port security     22-16

and private VLANs     22-16

and routed ports     22-16

and TCAM entries     22-16

and trunk interfaces     22-16

and VRF     22-16

binding configuration

automatic     22-15

manual     22-15

binding table     22-15

configuration guidelines     22-16

default configuration     22-16

described     22-14

disabling     22-17

displaying

bindings     22-17

configuration     22-17

enabling     22-16

filtering

source IP address     22-15

source IP and MAC address     22-15

source IP address filtering     22-15

source IP and MAC address filtering     22-15

static bindings

adding     22-16

deleting     22-17

IP traceroute

executing     41-18

overview     41-17

IP unicast routing

address resolution     35-9

administrative distances     35-63, 35-72

ARP     35-10

assigning IP addresses to Layer 3 interfaces     35-7

authentication keys     35-73

broadcast

address     35-17

flooding     35-17

packets     35-14

storms     35-14

classless routing     35-8

configuring static routes     35-62

default

addressing configuration     35-6

gateways     35-12

networks     35-63

routes     35-63

routing     35-3

directed broadcasts     35-15

disabling     35-19

dynamic routing     35-3

enabling     35-19

EtherChannel Layer 3 interface     35-5

IGP     35-25

inter-VLAN     35-2

IP addressing

classes     35-6

configuring     35-5

IPv6     36-3

IRDP     35-13

Layer 3 interfaces     35-5

MAC address and IP address     35-9

passive interfaces     35-70

protocols

distance-vector     35-3

dynamic     35-3

link-state     35-3

proxy ARP     35-10

IP unicast routing (continued)

redistribution     35-64

reverse address resolution     35-9

routed ports     35-5

static routing     35-3

steps to configure     35-5

subnet mask     35-7

subnet zero     35-7

supernet     35-8

UDP     35-16

with SVIs     35-5

See also BGP

See also EIGRP

See also OSPF

See also RIP

IPv4 and IPv6

configuring on an interface     36-13

differences     36-1

dual protocol stacks     36-5

IPv6

addresses     36-2

address formats     36-2

advantages     36-2

and switch stacks     36-7

applications     36-5

assigning address     36-11

autoconfiguration     36-4

CEFv6     36-15

configuring static routes     36-16

default configuration     36-10

defined     36-1

enabling     36-11

feature limitations     36-7

features not supported     36-6

ICMP     36-4

ICMP rate limiting     36-14

monitoring     36-22

OSPF     36-20

path MTU discovery     36-4

IPv6 (continued)

reasons for     36-1

RIP     36-18

SDM templates     8-2, 36-8

stack master functions     36-8

supported features     36-3

switch limitations     36-6

IRDP

configuring     35-13

definition     35-13

support for     1-9

ISL

and IPv6     36-3

and trunk ports     11-3

encapsulation     1-6, 13-16

trunking with 802.1 tunneling     17-5

isolated port     15-2

isolated VLANs     15-2, 15-3

J

join messages, IGMP     24-3

K

KDC

described     9-32

See also Kerberos

keepalive messages     18-2

Kerberos

authenticating to

boundary switch     9-35

KDC     9-35

network services     9-35

configuration examples     9-32

configuring     9-36

credentials     9-32

cryptographic software image     9-32

Kerberos (continued)

described     9-32

KDC     9-32

operation     9-34

realm     9-33

server     9-33

support for     1-8

switch as trusted third party     9-32

terms     9-33

TGT     9-34

tickets     9-32

key distribution center

See KDC

L

l2protocol-tunnel command     17-13

LACP

Layer 2 protocol tunneling     17-9

See EtherChannel

Layer 2 frames, classification with CoS     33-2

Layer 2 interfaces, default configuration     11-15

Layer 2 protocol tunneling

configuring     17-10

configuring for EtherChannels     17-14

default configuration     17-11

defined     17-8

guidelines     17-11

Layer 2 traceroute

and ARP     41-17

and CDP     41-16

broadcast traffic     41-16

described     41-16

IP addresses and subnets     41-17

MAC addresses and VLANs     41-16

multicast traffic     41-16

multiple devices on a port     41-17

unicast traffic     41-16

usage guidelines     41-16

Layer 2 trunks     13-17

Layer 3 features     1-9

Layer 3 interfaces

assigning IP addresses to     35-7

assigning IPv4 and IPv6 addresses to     36-13

assigning IPv6 addresses to     36-11

changing from Layer 2 mode     35-7

types of     35-5

Layer 3 packets, classification methods     33-2

LDAP     4-2

LEDs, switch

See hardware installation guide

lightweight directory access protocol

See LDAP

line configuration mode     2-2

Link Aggregation Control Protocol

See EtherChannel

link local unicast addresses     36-3

link redundancy

See Flex Links

links, unidirectional     27-1

link state advertisements (LSAs)     35-29

link-state protocols     35-3

load balancing     37-3

logging messages, ACL     32-10

login authentication

with RADIUS     9-23

with TACACS+     9-14

login banners     7-18

log messages

See system message logging

Long-Reach Ethernet (LRE) technology     1-15, 1-23

loop guard

described     20-11

enabling     20-18

support for     1-6

M

MAC addresses

aging time     7-22

and VLAN association     7-21

building the address table     7-21

default configuration     7-22

discovering     7-27

displaying     7-27

displaying in the IP source binding table     22-17

dynamic

learning     7-21

removing     7-23

in ACLs     32-27

IP address association     35-9

static

adding     7-25

allowing     7-27

characteristics of     7-25

dropping     7-26

removing     7-25

MAC address notification, support for     1-10

MAC address-to-VLAN mapping     13-28

MAC extended access lists

applying to Layer 2 interfaces     32-29

configuring for QoS     33-46

creating     32-27

defined     32-27

for QoS classification     33-5

macros

See Smartports macros

manageability features     1-5

management access

in-band

browser session     1-5

CLI session     1-5

device manager     1-5

SNMP     1-5

out-of-band console port connection     1-5

management options

CLI     2-1

clustering     1-3

CNS     4-1

Network Assistant     1-2

overview     1-4

switch stacks     1-3

mapping tables for QoS

configuring

CoS-to-DSCP     33-61

DSCP     33-61

DSCP-to-CoS     33-64

DSCP-to-DSCP-mutation     33-65

IP-precedence-to-DSCP     33-62

policed-DSCP     33-63

described     33-13

marking

action in policy map     33-49

action with aggregate policers     33-59

described     33-4, 33-8

matching, ACLs     32-8

maximum aging time

MSTP     19-22

STP     18-23

maximum hop count, MSTP     19-22

maximum-paths command     35-47, 35-62

membership mode, VLAN port     13-3

member switch

defined     6-2

managing     6-4

recovering from lost connectivity     41-12

requirements     6-3

See also candidate switch, cluster standby group, and standby command switch

messages

logging ACL violations     32-16

to users through banners     7-18

messages, to users through banners     7-18

metrics, in BGP     35-48

metric translations, between routing protocols     35-67

metro tags     17-2

MHSRP     37-3

MIBs

accessing files with FTP     A-3

location of files     A-3

overview     31-1

SNMP interaction with     31-4

supported     A-1

mini-point-of-presence

See POP

mirroring traffic for analysis     28-1

mismatches, autonegotiation     41-12

module number     11-10

monitoring

802.1Q tunneling     17-18

access groups     32-41

ACL configuration     32-41

BGP     35-59

cables for unidirectional links     27-1

CDP     26-5

CEF     35-61

EIGRP     35-39

fallback bridging     40-11

features     1-10

Flex Links     21-3

HSRP     37-11

IGMP

filters     24-25

snooping     24-13

interfaces     11-26

IP

address tables     35-18

multicast routing     38-50

routes     35-74

IPv6     36-22

Layer 2 protocol tunneling     17-18

MSDP peers     39-19

multicast router interfaces     24-13

monitoring (continued)

MVR     24-20

network traffic for analysis with probe     28-2

OSPF     35-33

port

blocking     25-16

protection     25-16

private VLANs     15-15

RP mapping information     38-23

SFP status     1-10, 11-27, 41-14

source-active messages     39-19

speed and duplex mode     11-19

traffic flowing among switches     29-1

traffic suppression     25-16

tunneling     17-18

VLAN

filters     32-41

maps     32-41

VLANs     13-16

VMPS     13-32

VTP     14-16

MSDP

benefits of     39-3

clearing MSDP connections and statistics     39-19

controlling source information

forwarded by switch     39-12

originated by switch     39-9

received by switch     39-14

default configuration     39-4

dense-mode regions

sending SA messages to     39-17

specifying the originating address     39-18

filtering

incoming SA messages     39-14

SA messages to a peer     39-12

SA requests from a peer     39-11

join latency, defined     39-6

MDSP (continued)

meshed groups

configuring     39-16

defined     39-16

originating address, changing     39-18

overview     39-1

peer-RPF flooding     39-2

peers

configuring a default     39-4

monitoring     39-19

peering relationship, overview     39-1

requesting source information from     39-8

shutting down     39-16

source-active messages

caching     39-6

clearing cache entries     39-19

defined     39-2

filtering from a peer     39-11

filtering incoming     39-14

filtering to a peer     39-12

limiting data with TTL     39-14

monitoring     39-19

restricting advertised sources     39-9

support for     1-9

MSTP

boundary ports

configuration guidelines     19-14

described     19-5

BPDU filtering

described     20-3

enabling     20-14

BPDU guard

described     20-3

enabling     20-13

CIST, described     19-3

configuration guidelines     19-13, 20-12

MSTP (continued)

configuring

forward-delay time     19-21

hello time     19-20

link type for rapid convergence     19-23

maximum aging time     19-22

maximum hop count     19-22

MST region     19-14

path cost     19-19

port priority     19-18

root switch     19-15

secondary root switch     19-17

switch priority     19-20

CST

defined     19-3

operations between regions     19-4

default configuration     19-13

default optional feature configuration     20-12

displaying status     19-24

enabling the mode     19-14

EtherChannel guard

described     20-10

enabling     20-17

extended system ID

effects on root switch     19-15

effects on secondary root switch     19-17

unexpected behavior     19-16

instances supported     18-10

interface state, blocking to forwarding     20-2

interoperability and compatibility among modes     18-11

interoperability with 802.1D

described     19-6

restarting migration process     19-23

IST

defined     19-3

master     19-3

operations within a region     19-3

MSTP (continued)

loop guard

described     20-11

enabling     20-18

mapping VLANs to MST instance     19-14

MST region

CIST     19-3

configuring     19-14

described     19-2

hop-count mechanism     19-5

IST     19-3

supported spanning-tree instances     19-2

optional features supported     1-6

overview     19-2

Port Fast

described     20-2

enabling     20-12

preventing root switch selection     20-10

root guard

described     20-10

enabling     20-17

root switch

configuring     19-16

effects of extended system ID     19-15

unexpected behavior     19-16

shutdown Port Fast-enabled port     20-3

stack changes, effects of     19-6

status, displaying     19-24

multicast groups

Immediate Leave     24-5

joining     24-3

leaving     24-5

static joins     24-10

multicast packets

ACLs on     32-40

blocking     25-7

multicast router interfaces, monitoring     24-13

multicast router ports, adding     24-9

Multicast Source Discovery Protocol

See MSDP

multicast storm     25-1

multicast storm-control command     25-4

Multicast VLAN Registration

See MVR

Multiple HSRP

See MHSRP

MVR

and address aliasing     24-17

configuring interfaces     24-18

default configuration     24-16

described     24-14

in the switch stack     24-16

modes     24-18

monitoring     24-20

setting global parameters     24-17

support for     1-4

N

named IP ACLs     32-15

NameSpace Mapper

See NSM

native VLAN

and 802.1Q tunneling     17-4

configuring     13-23

default     13-23

neighbor discovery/recovery, EIGRP     35-34

neighbors, BGP     35-54

Network Assistant

benefits     1-2

described     1-4

downloading image files     1-2

guide mode     1-2

management options     1-2

managing switch stacks     5-2, 5-16

requirements     xxx

Network Assistant (continued)

upgrading a switch     B-19

wizards     1-2

network configuration examples

cost-effective wiring closet     1-15

high-performance wiring closet     1-16

increasing network performance     1-14

large network     1-21

long-distance, high-bandwidth transport     1-24

multidwelling network     1-23

providing network services     1-15

redundant Gigabit backbone     1-17

server aggregation and Linux server cluster     1-17

small to medium-sized network     1-19

network design

performance     1-14

services     1-15

network management

CDP     26-1

RMON     29-1

SNMP     31-1

Network Time Protocol

See NTP

no commands     2-4

nonhierarchical policy maps

configuration guidelines     33-34

configuring     33-49

described     33-9

non-IP traffic filtering     32-27

nontrunking mode     13-18

normal-range VLANs

configuration modes     13-7

defined     13-1

no switchport command     11-4

note, described     xxx

not-so-stubby areas

See NSSA

NSM     4-3

NSSA, OSPF     35-29

NTP

associations

authenticating     7-5

defined     7-2

enabling broadcast messages     7-7

peer     7-6

server     7-6

default configuration     7-4

displaying the configuration     7-11

overview     7-2

restricting access

creating an access group     7-9

disabling NTP services per interface     7-10

source IP address, configuring     7-10

stratum     7-2

support for     1-5

synchronizing devices     7-6

time

services     7-2

synchronizing     7-2

O

offline configuration for switch stacks     5-7

Open Shortest Path First

See OSPF

optimizing system resources     8-1

options, management     1-4

OSPF

area parameters, configuring     35-29

configuring     35-27

default configuration

metrics     35-31

route     35-31

settings     35-26

described     35-25

for IPv6     36-20

interface parameters, configuring     35-28

LSA group pacing     35-32

OSPF (continued)

monitoring     35-33

router IDs     35-32

route summarization     35-30

support for     1-9

virtual links     35-30

out-of-profile markdown     1-8

P

packet modification, with QoS     33-20

PAgP

Layer 2 protocol tunneling     17-9

See EtherChannel

parallel paths, in routing tables     35-62

passive interfaces

configuring     35-70

OSPF     35-31

passwords

default configuration     9-2

disabling recovery of     9-5

encrypting     9-4

for security     1-7

overview     9-1

recovery of     41-3

setting

enable     9-3

enable secret     9-4

Telnet     9-6

with usernames     9-7

VTP domain     14-8

path cost

MSTP     19-19

STP     18-20

path MTU discovery     36-4

PBR

defined     35-67

enabling     35-69

fast-switched policy-based routing     35-70

local policy-based routing     35-70

peers, BGP     35-54

performance, network design     1-14

performance features     1-3

persistent self-signed certificate     9-43

per-VLAN spanning-tree plus

See PVST+

physical ports     11-2

PIM

default configuration     38-8

dense mode

overview     38-4

rendezvous point (RP), described     38-4

RPF lookups     38-7

displaying neighbors     38-51

enabling a mode     38-11

overview     38-3

router-query message interval, modifying     38-26

shared tree and source tree, overview     38-23

shortest path tree, delaying the use of     38-25

sparse mode

join messages and shared tree     38-4

overview     38-4

prune messages     38-5

RPF lookups     38-7

support for     1-9

versions

interoperability     38-9

troubleshooting interoperability problems     38-23

v2 improvements     38-4

PIM-DVMRP, as snooping method     24-8

ping

character output description     41-15

executing     41-15

overview     41-14

PoE

auto mode     11-8

CDP with power consumption, described     11-6

CDP with power negotiation, described     11-6

Cisco intelligent power management     11-6

configuring     11-21

devices supported     11-6

high-power devices operating in low-power mode     11-6

IEEE power classification levels     11-7

powered-device detection and initial power allocation     11-7

power management modes     11-8

power negotiation extensions to CDP     11-6

standards supported     11-6

static mode     11-8

supported watts per port     11-6

troubleshooting     41-13

policed-DSCP map for QoS     33-63

policers

configuring

for each matched traffic class     33-49

for more than one traffic class     33-59

described     33-4

displaying     33-79

number of     33-34

types of     33-9

policing

described     33-4

hierarchical

See hierarchical policy maps

token-bucket algorithm     33-9

policy-based routing

See PBR

policy maps

hierarchical     33-8

policy maps for QoS

characteristics of     33-49

described     33-7

displaying     33-80

hierarchical on SVIs

configuration guidelines     33-34

configuring     33-52

described     33-11

nonhierarchical on physical ports

configuration guidelines     33-34

configuring     33-49

described     33-9

POP     1-23

port ACLs

defined     32-2

types of     32-3

Port Aggregation Protocol

See EtherChannel

port-based authentication

accounting     10-5

authentication server

defined     10-2

RADIUS server     10-2

client, defined     10-2

configuration guidelines     10-12

configuring

802.1x authentication     10-14

guest VLAN     10-20

host mode     10-19

manual re-authentication of a client     10-17

periodic re-authentication     10-16

quiet period     10-17

RADIUS server     10-16

RADIUS server parameters on the switch     10-15

switch-to-client frame-retransmission number     10-18, 10-19

switch-to-client retransmission time     10-17

port-based authentication (continued)

default configuration     10-11

described     10-1

device roles     10-2

displaying statistics     10-23

EAPOL-start frame     10-3

EAP-request/identity frame     10-3

EAP-response/identity frame     10-3

encapsulation     10-3

guest VLAN

configuration guidelines     10-9

described     10-8

host mode     10-5

initiation and message exchange     10-3

method lists     10-14

multiple-hosts mode, described     10-5

per-user ACLs

AAA authorization     10-14

configuration tasks     10-10

described     10-9

RADIUS server attributes     10-9

ports

authorization state and dot1x port-control command     10-4

authorized and unauthorized     10-4

voice VLAN     10-7

port security

and voice VLAN     10-6

described     10-6

interactions     10-6

multiple-hosts mode     10-5

resetting to default values     10-22

stack changes, effects of     10-10

statistics, displaying     10-23

switch

as proxy     10-2

RADIUS client     10-2

upgrading from a previous release     10-13, 33-27

port-based authentication (continued)

VLAN assignment

AAA authorization     10-14

characteristics     10-8

configuration tasks     10-8

described     10-7

voice VLAN

described     10-7

PVID     10-7

VVID     10-7

port blocking     1-4, 25-6

port-channel

See EtherChannel

Port Fast

described     20-2

enabling     20-12

mode, spanning tree     13-29

support for     1-6

port membership modes, VLAN     13-3

port priority

MSTP     19-18

STP     18-18

ports

10-Gigabit Ethernet module     11-6

802.1Q tunnel     13-4

access     11-3

blocking     25-6

dynamic access     13-3

protected     25-5

routed     11-4

secure     25-7

static-access     13-3, 13-11

switch     11-2

trunks     13-3, 13-16

VLAN assignments     13-11

port security

aging     25-15

and QoS trusted boundary     33-39

and stacking     25-16

configuring     25-12

default configuration     25-10

described     25-7

displaying     25-16

on trunk ports     25-13

sticky learning     25-8

violations     25-9

with other features     25-10

port-shutdown response, VMPS     13-28

Power over Ethernet

See PoE

preferential treatment of traffic

See QoS

prefix lists, BGP     35-51

preventing unauthorized access     9-1

primary links     21-1

primary VLANs     15-1, 15-3

priority

HSRP     37-7

overriding CoS     16-6

trusting CoS     16-6

private VLAN edge ports

See protected ports

private VLANs

across multiple switches     15-4

and SDM template     15-4

and SVIs     15-5

and switch stacks     15-6

benefits of     15-1

community ports     15-2

community VLANs     15-2, 15-3

configuration guidelines     15-7, 15-9

configuration tasks     15-6

configuring     15-10

default configuration     15-7

private VLANs (continued)

end station access to     15-3

IP addressing     15-3

isolated port     15-2

isolated VLANs     15-2, 15-3

mapping     15-14

monitoring     15-15

ports

community     15-2

configuration guidelines     15-9

configuring host ports     15-12

configuring promiscuous ports     15-13

described     13-4

isolated     15-2

promiscuous     15-2

primary VLANs     15-1, 15-3

promiscuous ports     15-2

secondary VLANs     15-2

subdomains     15-1

traffic in     15-5

privileged EXEC mode     2-2

privilege levels

changing the default for lines     9-9

command switch     6-4

exiting     9-10

logging into     9-10

mapping on member switches     6-4

overview     9-2, 9-8

setting a command with     9-8

promiscuous ports

configuring     15-13

defined     15-2

protected ports     1-7, 25-5

protocol-dependent modules, EIGRP     35-35

Protocol-Independent Multicast Protocol

See PIM

provisioning new members for a switch stack     5-7

proxy ARP

configuring     35-12

definition     35-10

with IP routing disabled     35-12

pruning, VTP

disabling

in VTP domain     14-14

on a port     13-23

enabling

in VTP domain     14-14

on a port     13-22

examples     14-5

overview     14-4

pruning-eligible list

changing     13-22

for VTP pruning     14-5

VLANs     14-14

PVST+

802.1Q trunking interoperability     18-11

described     18-10

instances supported     18-10

Q

QoS

and MQC commands     33-1

auto-QoS

categorizing traffic     33-21

configuration and defaults display     33-31

configuration guidelines     33-26

described     33-21

disabling     33-28

displaying generated commands     33-28

displaying the initial configuration     33-31

effects on running configuration     33-26

egress queue defaults     33-22

enabling for VoIP     33-28

example configuration     33-29

QoS (continued)

auto-QoS (continued)

ingress queue defaults     33-22

list of generated commands     33-23

basic model     33-4

classification

class maps, described     33-7

defined     33-4

DSCP transparency, described     33-40

flowchart     33-6

forwarding treatment     33-3

in frames and packets     33-3

IP ACLs, described     33-5, 33-7

MAC ACLs, described     33-5, 33-7

options for IP traffic     33-5

options for non-IP traffic     33-5

policy maps, described     33-7

trust DSCP, described     33-5

trusted CoS, described     33-5

trust IP precedence, described     33-5

class maps

configuring     33-47

displaying     33-79

configuration guidelines

auto-QoS     33-26

standard QoS     33-34

configuring

aggregate policers     33-59

auto-QoS     33-21

default port CoS value     33-38

DSCP maps     33-61

DSCP transparency     33-40

DSCP trust states bordering another domain     33-41

egress queue characteristics     33-72

ingress queue characteristics     33-67

IP extended ACLs     33-45

IP standard ACLs     33-43

MAC ACLs     33-46

QoS (continued)

configuring (continued)

policy maps, hierarchical     33-52

policy maps on physical ports     33-49

port trust states within the domain     33-36

trusted boundary     33-39

default auto configuration     33-21

default standard configuration     33-32

displaying statistics     33-79

DSCP transparency     33-40

egress queues

allocating buffer space     33-72

buffer allocation scheme, described     33-19

configuring shaped weights for SRR     33-76

configuring shared weights for SRR     33-77

described     33-4

displaying the threshold map     33-75

flowchart     33-18

mapping DSCP or CoS values     33-74

scheduling, described     33-4

setting WTD thresholds     33-72

WTD, described     33-20

enabling globally     33-35

flowcharts

classification     33-6

egress queueing and scheduling     33-18

ingress queueing and scheduling     33-16

policing and marking     33-10

implicit deny     33-7

ingress queues

allocating bandwidth     33-70

allocating buffer space     33-69

buffer and bandwidth allocation, described     33-17

configuring shared weights for SRR     33-70

configuring the priority queue     33-71

described     33-4

displaying the threshold map     33-68

flowchart     33-16

mapping DSCP or CoS values     33-68

QoS (continued)

ingress queues (continued)

priority queue, described     33-17

scheduling, described     33-4

setting WTD thresholds     33-68

WTD, described     33-17

IP phones

automatic classification and queueing     33-21

detection and trusted settings     33-21, 33-39

limiting bandwidth on egress interface     33-78

mapping tables

CoS-to-DSCP     33-61

displaying     33-79

DSCP-to-CoS     33-64

DSCP-to-DSCP-mutation     33-65

IP-precedence-to-DSCP     33-62

policed-DSCP     33-63

types of     33-13

marked-down actions     33-51, 33-56

marking, described     33-4, 33-8

overview     33-2

packet modification     33-20

policers

configuring     33-51, 33-56, 33-59

described     33-8

displaying     33-79

number of     33-34

types of     33-9

policies, attaching to an interface     33-8

policing

described     33-4, 33-8

token bucket algorithm     33-9

policy maps

characteristics of     33-49

displaying     33-80

hierarchical     33-8

hierarchical on SVIs     33-52

nonhierarchical on physical ports     33-49

QoS label, defined     33-4

QoS (continued)

queues

configuring egress characteristics     33-72

configuring ingress characteristics     33-67

high priority (expedite)     33-20, 33-78

location of     33-14

SRR, described     33-15

WTD, described     33-14

rewrites     33-20

support for     1-8

trust states

bordering another domain     33-41

described     33-5

trusted device     33-39

within the domain     33-36

quality of service

See QoS

queries, IGMP     24-4

R

RADIUS

attributes

vendor-proprietary     9-31

vendor-specific     9-29

configuring

accounting     9-28

authentication     9-23

authorization     9-27

communication, global     9-21, 9-29

communication, per-server     9-20, 9-21

multiple UDP ports     9-21

default configuration     9-20

defining AAA server groups     9-25

displaying the configuration     9-31

identifying the server     9-20

limiting the services to the user     9-27

method list, defined     9-20

operation of     9-19

RADIUS (continued)

overview     9-18

suggested network environments     9-18

support for     1-8

tracking services accessed by user     9-28

range

macro     11-13

of interfaces     11-12

rapid convergence     19-8

rapid per-VLAN spanning-tree plus

See rapid PVST+

rapid PVST+

802.1Q trunking interoperability     18-11

described     18-10

instances supported     18-10

Rapid Spanning Tree Protocol

See RSTP

RARP     35-10

rcommand command     6-4

RCP

configuration files

downloading     B-17

overview     B-15

preparing the server     B-16

uploading     B-18

image files

deleting old image     B-32

downloading     B-31

preparing the server     B-29

uploading     B-33

reconfirmation interval, VMPS, changing     13-31

recovery procedures     41-1

redundancy

EtherChannel     34-2

HSRP     37-1

redundancy (continued)

STP

backbone     18-9

multidrop backbone     20-5

path cost     13-26

port priority     13-24

redundant links and UplinkFast     20-15

reliable transport protocol, EIGRP     35-34

reloading software     3-16

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

Remote SPAN

See RSPAN

report suppression, IGMP

described     24-5

disabling     24-12

requirements

cluster     xxxi

device manager     xxx

Network Assistant     xxx

resequencing ACL entries     32-15

resets, in BGP     35-46

resetting a UDLD-shutdown interface     27-6

restricting access

NTP services     7-8

overview     9-1

passwords and privilege levels     9-2

RADIUS     9-17

TACACS+     9-10

retry count, VMPS, changing     13-32

reverse address resolution     35-9

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP     35-20

1112, IP multicast and IGMP     24-2

1157, SNMPv1     31-2

1163, BGP     35-40

1166, IP addresses     35-6

1253, OSPF     35-25

1267, BGP     35-40

1305, NTP     7-2

1587, NSSAs     35-25

1757, RMON     29-2

1771, BGP     35-40

1901, SNMPv2C     31-2

1902 to 1907, SNMPv2     31-2

2236, IP multicast and IGMP     24-2

2273-2275, SNMPv3     31-2

RIP

advertisements     35-20

authentication     35-23

configuring     35-21

default configuration     35-21

described     35-20

for IPv6     36-18

hop counts     35-20

split horizon     35-23

summary addresses     35-23

support for     1-9

RMON

default configuration     29-3

displaying status     29-6

enabling alarms and events     29-3

groups supported     29-2

overview     29-1

statistics

collecting group Ethernet     29-6

collecting group history     29-5

support for     1-10

root guard

described     20-10

enabling     20-17

support for     1-6

root switch

MSTP     19-15

STP     18-16

route calculation timers, OSPF     35-31

route dampening, BGP     35-58

routed packets, ACLs on     32-39

routed ports

configuring     35-5

defined     11-4

IP addresses on     11-23, 35-5

route-map command     35-69

route maps

BGP     35-49

policy-based routing     35-68

router ACLs

defined     32-2

types of     32-4

route reflectors, BGP     35-57

router ID, OSPF     35-32

route selection, BGP     35-47

route summarization, OSPF     35-30

routing

default     35-3

dynamic     35-3

redistribution of information     35-64

static     35-3

routing domain confederation, BGP     35-56

Routing Information Protocol

See RIP

routing protocol administrative distances     35-63

RSPAN

and stack changes     28-10

characteristics     28-9

configuration guidelines     28-17

default configuration     28-11

destination ports     28-7

displaying status     28-25

in a switch stack     28-2

interaction with other features     28-9

monitored ports     28-6

monitoring ports     28-7

overview     1-10, 28-1

received traffic     28-5

session limits     28-11

sessions

creating     28-18

defined     28-4

limiting source traffic to specific VLANs     28-24

specifying monitored ports     28-18

with ingress traffic enabled     28-22

source ports     28-6

transmitted traffic     28-6

VLAN-based     28-7

RSTP

active topology     19-7

BPDU

format     19-10

processing     19-11

designated port, defined     19-7

designated switch, defined     19-7

interoperability with 802.1D

described     19-6

restarting migration process     19-23

topology changes     19-11

overview     19-6

RSTP (continued)

port roles

described     19-7

synchronized     19-9

proposal-agreement handshake process     19-8

rapid convergence

cross-stack rapid convergence     19-8

described     19-8

edge ports and Port Fast     19-8

point-to-point links     19-8, 19-23

root ports     19-8

root port, defined     19-7

See also MSTP

running configuration, saving     3-10

S

scheduled reloads     3-16

SDM

described     8-1

switch stack consideration     5-10

templates

configuring     8-6

number of     8-1

SDM mismatch mode     5-10, 8-4

SDM template

aggregator     8-1

configuration guidelines     8-5

configuring     8-5

desktop     8-1

dual IPv4 and IPv6     8-2

types of     8-1

secondary VLANs     15-2

secure HTTP client

configuring     9-47

displaying     9-48

secure HTTP server

configuring     9-46

displaying     9-48

secure MAC addresses

and switch stacks     25-16

deleting     25-14

maximum number of     25-8

types of     25-8

secure ports

and switch stacks     25-16

configuring     25-7

secure remote connections     9-38

Secure Shell

See SSH

Secure Socket Layer

See SSL

security, port     25-7

security features     1-7

sequence numbers in log messages     30-8

server mode, VTP     14-3

service-provider network, MSTP and RSTP     19-1

service-provider networks

and 802.1Q tunneling     17-1

and customer VLANs     17-2

Layer 2 protocols across     17-8

Layer 2 protocol tunneling for EtherChannels     17-9

set-request operation     31-4

setup program

failed command switch replacement     41-11

replacing failed command switch     41-9

severity levels, defining in system messages     30-9

SFPs

monitoring status of     1-10, 11-27, 41-14

numbering of     11-11

security and identification     41-13

status, displaying     1-10

shaped round robin

See SRR

show access-lists hw-summary command     32-22

show and more command output, filtering     2-8

show cdp traffic command     26-5

show cluster members command     6-4

show configuration command     11-22

show forward command     41-22

show interfaces command     11-19, 11-22

show l2protocol command     17-14, 17-16

show platform forward command     41-22

show running-config command

displaying ACLs     32-20, 32-21, 32-32, 32-34

interface description in     11-22

shutdown command on interfaces     11-27

shutdown threshold for Layer 2 protocol packets     17-11

Simple Network Management Protocol

See SNMP

small form-factor pluggable modules

See SFPs

Smartports macros

applying Cisco-default macros     12-6

applying global parameter values     12-5, 12-6

applying macros     12-5

applying parameter values     12-5, 12-7

configuration guidelines     12-3

creating     12-4

default configuration     12-2

defined     12-1

displaying     12-8

tracing     12-3

website     12-2

SMI     1-1

SNAP     26-1

SNMP

accessing MIB variables with     31-4

agent

described     31-4

disabling     31-8

authentication level     31-10

SNMP (continued)

community strings

configuring     31-8

for cluster switches     31-4

overview     31-4

configuration examples     31-16

default configuration     31-6

engine ID     31-7

groups     31-7, 31-9

host     31-7

ifIndex values     31-5

in-band management     1-5

informs

and trap keyword     31-11

described     31-5

differences from traps     31-5

disabling     31-14

enabling     31-14

limiting access by TFTP servers     31-15

limiting system log messages to NMS     30-10

manager functions     1-4, 31-3

managing clusters with     6-5

MIBs

location of     A-3

supported     A-1

notifications     31-5

overview     31-1, 31-4

security levels     31-3

status, displaying     31-17

system contact and location     31-15

trap manager, configuring     31-13

traps

described     31-3, 31-5

differences from informs     31-5

disabling     31-14

enabling     31-11

SNMP (continued)

traps (continued)

enabling MAC address notification     7-23

overview     31-1, 31-4

types of     31-11

users     31-7, 31-9

versions supported     31-2

SNMPv1     31-2

SNMPv2C     31-2

SNMPv3     31-2

snooping, IGMP     24-1

software compatibility

See stacks, switch

software images

location in flash     B-20

recovery procedures     41-2

scheduling reloads     3-16

tar file format, described     B-20

See also downloading and uploading

source addresses, in ACLs     32-12

source-and-destination-IP address based forwarding, EtherChannel     34-8

source-and-destination MAC address forwarding, EtherChannel     34-8

source-IP address based forwarding, EtherChannel     34-8

source-MAC address forwarding, EtherChannel     34-7

SPAN

and stack changes     28-10

configuration guidelines     28-11

default configuration     28-11

destination ports     28-7

displaying status     28-25

interaction with other features     28-9

monitored ports     28-6

monitoring ports     28-7

overview     1-10, 28-1

ports, restrictions     25-11

received traffic     28-5

SPAN (continued)

session limits     28-11

sessions

configuring ingress forwarding     28-16, 28-23

creating     28-12

defined     28-4

limiting source traffic to specific VLANs     28-16

removing destination (monitoring) ports     28-14

specifying monitored ports     28-12

with ingress traffic enabled     28-15

source ports     28-6

transmitted traffic     28-6

VLAN-based     28-7

spanning tree and native VLANs     13-19

Spanning Tree Protocol

See STP

SPAN traffic     28-5

speed, configuring on interfaces     11-17

split horizon, RIP     35-23

SRR

configuring

shaped weights on egress queues     33-76

shared weights on egress queues     33-77

shared weights on ingress queues     33-70

described     33-15

shaped mode     33-15

shared mode     33-15

support for     1-9

SSH

configuring     9-39

cryptographic software image     9-37

described     1-5, 9-38

encryption methods     9-38

switch stack considerations     5-17, 9-38

user authentication methods, supported     9-38

SSL

configuration guidelines     9-44

configuring a secure HTTP client     9-47

configuring a secure HTTP server     9-45

SSL (continued)

cryptographic software image     9-42

described     9-41

monitoring     9-48

stack changes

effects on

IPv6 routing     36-7

stack changes, effects on

802.1x port-based authentication     10-10

ACL configuration     32-7

CDP     26-2

cross-stack EtherChannel     34-12

EtherChannel     34-9

fallback bridging     40-3

HSRP     37-4

IGMP snooping     24-6

IP routing     35-4

MAC address tables     7-21

MSTP     19-6

multicast routing     38-8

MVR     24-14

port security     25-16

SDM template selection     8-4

SNMP     31-1

SPAN and RSPAN     28-10

STP     18-12

system message log     30-2

VLANs     13-6

VTP     14-6

stack master

bridge ID (MAC address)     5-5

defined     5-1

election     5-4

IPv6     36-8

re-election     5-4

See also stacks, switch

stack member

accessing CLI of specific member     5-23

configuring

member number     5-21

priority value     5-22

defined     5-1

displaying information of     5-23

IPv6     36-8

number     5-6

priority value     5-7

provisioning a new member     5-22

replacing     5-15

See also stacks, switch

stack member number     11-10

stack protocol version     5-11

stacks, switch

accessing CLI of specific member     5-23

assigning information

member number     5-21

priority value     5-22

provisioning a new member     5-22

auto-advise     5-12

auto-copy     5-12

auto-upgrade     5-12

benefits     1-2

bridge ID     5-5

CDP considerations     26-2

compatibility, software     5-10

configuration file     5-15

configuration scenarios     5-17

copying an image file from one member to another     B-34

default configuration     5-20

description of     5-1

displaying information of     5-23

hardware compatibility and SDM mismatch mode     5-10

HSRP considerations     37-4

incompatible software and image upgrades     5-15, B-34

IPv6 on     36-7

MAC address considerations     7-21

stacks, switch (continued)

management connectivity     5-16

managing     5-1

membership     5-3

merged     5-3

MSTP instances supported     18-10

multicast routing, stack master and member roles     38-8

offline configuration

described     5-7

effects of adding a provisioned switch     5-8

effects of removing a provisioned switch     5-10

effects of replacing a provisioned switch     5-10

provisioned configuration, defined     5-7

provisioned switch, defined     5-7

provisioning a new member     5-22

partitioned     5-3, 41-8

provisioned switch

adding     5-8

removing     5-10

replacing     5-10

replacing a failed member     5-15

software compatibility     5-10

software image version     5-10

stack protocol version     5-11

STP

bridge ID     18-3

instances supported     18-10

root port selection     18-3

stack root switch election     18-3

system messages

hostnames in the display     30-1

remotely monitoring     30-2

system prompt consideration     7-14

system-wide configuration considerations     5-16

upgrading     B-34

stacks, switch (continued)

version-mismatch (VM) mode

automatic upgrades with auto-upgrade     5-12

described     5-12

examples     5-13

manual upgrades with auto-advise     5-12

See also stack master and stack member

StackWise technology, Cisco     1-3

See also stacks, switch

standard multilayer image

See SMI

standby command switch, requirements     6-2

standby ip command     37-5

standby links     21-1

standby router     37-1

standby timers, HSRP     37-9

startup configuration

booting

manually     3-13

specific image     3-13

clearing     B-19

configuration file

automatically downloading     3-12

specifying the filename     3-12

default boot configuration     3-12

stateless autoconfiguration     36-4

static access ports

assigning to VLAN     13-11

defined     11-3, 13-3

static addresses

See addresses

static IP routing     1-9

static MAC addressing     1-7

static routes

configuring     35-62

configuring for IPv6     36-16

static routing     35-3

static VLAN membership     13-2

statistics

802.1x     10-23

CDP     26-5

interface     11-26

IP multicast routing     38-51

OSPF     35-33

QoS ingress and egress     33-79

RMON group Ethernet     29-6

RMON group history     29-5

SNMP input and output     31-17

VTP     14-16

sticky learning     25-8

storm control

configuring     25-3

described     25-1

disabling     25-5

displaying     25-16

support for     1-4

thresholds     25-1

STP

802.1D and bridge ID     18-4

802.1D and multicast addresses     18-9

802.1t and VLAN identifier     18-4

accelerating root port selection     20-4

BackboneFast

described     20-7

disabling     20-17

enabling     20-16

BPDU filtering

described     20-3

disabling     20-15

enabling     20-14

STP (continued)

BPDU guard

described     20-3

disabling     20-14

enabling     20-13

BPDU message exchange     18-3

configuration guidelines     18-13, 20-12

configuring

forward-delay time     18-23

hello time     18-22

maximum aging time     18-23

path cost     18-20

port priority     18-18

root switch     18-16

secondary root switch     18-18

spanning-tree mode     18-15

switch priority     18-21

counters, clearing     18-24

cross-stack UplinkFast

described     20-5

enabling     20-16

default configuration     18-13

default optional feature configuration     20-12

designated port, defined     18-4

designated switch, defined     18-4

detecting indirect link failures     20-8

disabling     18-16

displaying status     18-24

EtherChannel guard

described     20-10

disabling     20-17

enabling     20-17

extended system ID

effects on root switch     18-16

effects on the secondary root switch     18-18

overview     18-4

unexpected behavior     18-16

STP (continued)

features supported     1-6

inferior BPDU     18-3

instances supported     18-10

interface state, blocking to forwarding     20-2

interface states

blocking     18-7

disabled     18-8

forwarding     18-6, 18-7

learning     18-7

listening     18-7

overview     18-5

interoperability and compatibility among modes     18-11

keepalive messages     18-2

Layer 2 protocol tunneling     17-8

limitations with 802.1Q trunks     18-11

load sharing

overview     13-24

using path costs     13-26

using port priorities     13-24

loop guard

described     20-11

enabling     20-18

modes supported     18-10

multicast addresses, effect of     18-9

optional features supported     1-6

overview     18-2

path costs     13-26, 13-27

Port Fast

described     20-2

enabling     20-12

port priorities     13-25

preventing root switch selection     20-10

protocols supported     18-10

redundant connectivity     18-9

root guard

described     20-10

enabling     20-17

root port, defined     18-3

STP (continued)

root port selection on a switch stack     18-3

root switch

configuring     18-16

effects of extended system ID     18-4, 18-16

election     18-3

unexpected behavior     18-16

shutdown Port Fast-enabled port     20-3

stack changes, effects of     18-12

status, displaying     18-24

superior BPDU     18-3

timers, described     18-22

UplinkFast

described     20-4

enabling     20-15

VLAN-bridge     18-12

stratum, NTP     7-2

stub areas, OSPF     35-29

subdomains, private VLAN     15-1

subnet mask     35-7

subnet zero     35-7

success response, VMPS     13-28

summer time     7-13

SunNet Manager     1-4

supernet     35-8

SVIs

and IP unicast routing     35-5

and router ACLs     32-4

connecting VLANs     11-9

defined     11-5

routing between VLANs     13-2

switch clustering technology     6-1

See also clusters, switch

switch console port     1-5

Switch Database Management

See SDM

switched packets, ACLs on     32-38

Switched Port Analyzer

See SPAN

switched ports     11-2

switchport block multicast command     25-7

switchport block unicast command     25-7

switchport command     11-15

switchport mode dot1q-tunnel command     17-6

switchport protected command     25-6

switch priority

MSTP     19-20

STP     18-21

switch software features     1-1

switch virtual interface

See SVI

synchronization, BGP     35-44

syslog

See system message logging

system clock

configuring

daylight saving time     7-13

manually     7-11

summer time     7-13

time zones     7-12

displaying the time and date     7-12

overview     7-2

See also NTP

system message logging

default configuration     30-4

defining error message severity levels     30-9

disabling     30-4

displaying the configuration     30-13

enabling     30-5

facility keywords, described     30-13

level keywords, described     30-10

limiting messages     30-10

message format     30-2

overview     30-1

sequence numbers, enabling and disabling     30-8

setting the display destination device     30-5

stack changes, effects of     30-2

synchronizing log messages     30-6

system message logging (continued)

syslog facility     1-10

time stamps, enabling and disabling     30-8

UNIX syslog servers

configuring the daemon     30-12

configuring the logging facility     30-12

facilities supported     30-13

system MTU and 802.1Q tunneling     17-5

system name

default configuration     7-15

default setting     7-15

manual configuration     7-15

See also DNS

system prompt

default setting     7-14 to  7-15

manual configuration     7-16

system resources, optimizing     8-1

T

TACACS+

accounting, defined     9-11

authentication, defined     9-11

authorization, defined     9-11

configuring

accounting     9-17

authentication key     9-13

authorization     9-16

login authentication     9-14

default configuration     9-13

displaying the configuration     9-17

identifying the server     9-13

limiting the services to the user     9-16

operation of     9-12

overview     9-10

support for     1-8

tracking services accessed by user     9-17

tagged packets

802.1Q     17-3

Layer 2 protocol     17-8

tar files

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

TDR     1-10

Telnet

accessing management interfaces     2-9

number of connections     1-5

setting a password     9-6

templates, SDM     8-1

temporary self-signed certificate     9-43

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password     9-6

TFTP

configuration files

downloading     B-11

preparing the server     B-10

uploading     B-11

configuration files in base directory     3-6

configuring for autoconfiguration     3-6

image files

deleting     B-23

downloading     B-22

preparing the server     B-22

uploading     B-24

limiting access by servers     31-15

TFTP server     1-5

threshold, traffic level     25-2

time

See NTP and system clock

Time Domain Reflector

See TDR

time-range command     32-17

time ranges in ACLs     32-17

time stamps in log messages     30-8

time zones     7-12

Token Ring VLANs

support for     13-6

VTP support     14-4

ToS     1-8

traceroute, Layer 2

and ARP     41-17

and CDP     41-16

broadcast traffic     41-16

described     41-16

IP addresses and subnets     41-17

MAC addresses and VLANs     41-16

multicast traffic     41-16

multiple devices on a port     41-17

unicast traffic     41-16

usage guidelines     41-16

traceroute command     41-18

See also IP traceroute

traffic

blocking flooded     25-6

fragmented     32-5

unfragmented     32-5

traffic policing     1-8

traffic suppression     25-1

transparent mode, VTP     14-3, 14-12

trap-door mechanism     3-2

traps

configuring MAC address notification     7-23

configuring managers     31-11

defined     31-3

enabling     7-23, 31-11

notification types     31-11

overview     31-1, 31-4

troubleshooting

connectivity problems     41-14, 41-16, 41-17

detecting unidirectional links     27-1

displaying crash information     41-24

PIMv1 and PIMv2 interoperability problems     38-23

troubleshooting (continued)

setting packet forwarding     41-22

SFP security and identification     41-13

show forward command     41-22

with CiscoWorks     31-4

with debug commands     41-20

with ping     41-14

with system message logging     30-1

with traceroute     41-17

trunking encapsulation     1-6

trunk ports

configuring     13-20

defined     11-3, 13-3

encapsulation     13-20, 13-25, 13-27

secure MAC addresses on     25-12

trunks

allowed-VLAN list     13-21

configuring     13-20, 13-25, 13-27

ISL     13-16

load sharing

setting STP path costs     13-26

using STP port priorities     13-24, 13-25

native VLAN for untagged traffic     13-23

parallel     13-26

pruning-eligible list     13-22

to non-DTP device     13-17

understanding     13-17

trusted boundary for QoS     33-39

trusted port states

between QoS domains     33-41

classification options     33-5

ensuring port security for IP phones     33-39

support for     1-8

within a QoS domain     33-36

trustpoints, CA     9-42

tunneling

802.1Q     17-1

defined     17-1

Layer 2 protocol     17-8

tunnel ports

802.1Q, configuring     17-6

defined     13-4

described     11-4, 17-1

incompatibilities with other features     17-6

twisted-pair Ethernet, detecting unidirectional links     27-1

type of service

See ToS

U

UDLD

default configuration     27-4

disabling

fiber-optic interfaces     27-5

globally     27-5

per interface     27-6

echoing detection mechanism     27-3

enabling

globally     27-5

per interface     27-6

Layer 2 protocol tunneling     17-10

link-detection mechanism     27-1

neighbor database     27-2

overview     27-1

resetting an interface     27-6

status, displaying     27-7

support for     1-6

UDP, configuring     35-16

unauthorized ports with 802.1x     10-4

unicast MAC address filtering     1-5

and adding static addresses     7-26

and broadcast MAC addresses     7-26

and CPU packets     7-26

and multicast addresses     7-26

and router MAC addresses     7-26

configuration guidelines     7-26

described     7-26

unicast storm     25-1

unicast storm control command     25-4

unicast traffic, blocking     25-7

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration     30-12

facilities supported     30-13

message logging configuration     30-12

unrecognized Type-Length-Value (TLV) support     14-4

upgrading information

See release notes

upgrading software images

See downloading

UplinkFast

described     20-4

disabling     20-16

enabling     20-15

support for     1-6

uploading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-14

using RCP     B-18

using TFTP     B-11

image files

preparing     B-22, B-25, B-29

reasons for     B-19

using FTP     B-28

using RCP     B-33

using TFTP     B-24

User Datagram Protocol

See UDP

user EXEC mode     2-2

username-based authentication     9-7

V

version-dependent transparent mode     14-4

version-mismatch (VM) mode

automatic upgrades with auto-upgrade     5-12

described     5-12

displaying     5-12

manual upgrades with auto-advise     5-12

virtual router     37-1, 37-2

vlan.dat file     13-5

VLAN 1, disabling on a trunk port     13-22

VLAN 1 minimization     13-21

VLAN ACLs

See VLAN maps

vlan-assignment response, VMPS     13-28

VLAN configuration

at bootup     13-8

saving     13-8

VLAN configuration mode     2-2, 13-7

VLAN database

and startup configuration file     13-8

and VTP     14-1

VLAN configuration saved in     13-7

VLANs saved in     13-4

vlan database command     13-7

vlan dot1q tag native command     17-5

VLAN filtering and SPAN     28-7

vlan global configuration command     13-7

VLAN ID, discovering     7-27

VLAN management domain     14-2

VLAN Management Policy Server

See VMPS

VLAN map entries, order of     32-31

VLAN maps

applying     32-34

common uses for     32-35

VLAN maps (continued)

configuration example     32-35

configuration guidelines     32-31

configuring     32-30

creating     32-32

defined     32-2

denying access example     32-36

denying and permitting packets     32-32

displaying     32-41

examples     32-36

removing     32-34

support for     1-7

with router ACLs     32-41

VLAN membership

confirming     13-31

modes     13-3

VLAN Query Protocol

See VQP

VLANs

adding     13-9

adding to VLAN database     13-9

aging dynamic addresses     18-10

allowed on trunk     13-21

and spanning-tree instances     13-3, 13-6, 13-13

configuration guidelines, extended-range VLANs     13-13

configuration guidelines, normal-range VLANs     13-6

configuration options     13-7

configuring     13-1

configuring IDs 1006 to 4094     13-13

connecting through SVIs     11-9

creating in config-vlan mode     13-9

creating in VLAN configuration mode     13-10

customer numbering in service-provider networks     17-3

default configuration     13-8

deleting     13-10

described     11-2, 13-1

displaying     13-16

extended-range     13-1, 13-12

features     1-6

VLANs (continued)

illustrated     13-2

internal     13-13

in the switch stack     13-6

limiting source traffic with RSPAN     28-24

limiting source traffic with SPAN     28-16

modifying     13-9

native, configuring     13-23

normal-range     13-1, 13-4

number supported     1-6

parameters     13-5

port membership modes     13-3

static-access ports     13-11

STP and 802.1Q trunks     18-11

supported     13-2

Token Ring     13-6

traffic between     13-2

VLAN-bridge STP     18-12, 40-2

VTP modes     14-3

VLAN Trunking Protocol

See VTP

VLAN trunks     13-16, 13-17

VMPS

administering     13-32

configuration example     13-33

configuration guidelines     13-29

default configuration     13-29

description     13-27

dynamic port membership

described     13-28

reconfirming     13-31

troubleshooting     13-33

entering server address     13-30

mapping MAC addresses to VLANs     13-28

monitoring     13-32

reconfirmation interval, changing     13-31

reconfirming membership     13-31

retry count, changing     13-32

voice-over-IP     16-1

voice VLAN

Cisco 7960 phone, port connections     16-1

configuration guidelines     16-3

configuring IP phones for data traffic

override CoS of incoming frame     16-6

trust CoS priority of incoming frame     16-6

configuring ports for voice traffic in

802.1p priority tagged frames     16-5

802.1Q frames     16-5

connecting to an IP phone     16-4

default configuration     16-3

described     16-1

displaying     16-6

VQP     1-6, 13-27

VTP

adding a client to a domain     14-14

advertisements     13-19, 14-3

and extended-range VLANs     14-2

and normal-range VLANs     14-2

client mode, configuring     14-11

configuration

global configuration mode     14-7

guidelines     14-8

privileged EXEC mode     14-7

requirements     14-9

saving     14-7

VLAN configuration mode     14-8

configuration mode options     14-7

configuration requirements     14-9

configuration revision number

guideline     14-14

resetting     14-15

configuring

client mode     14-11

server mode     14-9

transparent mode     14-12

consistency checks     14-4

VTP (continued)

default configuration     14-7

described     14-1

disabling     14-12

domain names     14-8

domains     14-2

Layer 2 protocol tunneling     17-8

modes

client     14-3, 14-11

server     14-3, 14-9

transitions     14-3

transparent     14-3, 14-12

monitoring     14-16

passwords     14-8

pruning

disabling     14-14

enabling     14-14

examples     14-5

overview     14-4

support for     1-7

pruning-eligible list, changing     13-22

server mode, configuring     14-9

statistics     14-16

support for     1-7

Token Ring support     14-4

transparent mode, configuring     14-12

using     14-1

version, guidelines     14-9

Version 1     14-4

Version 2

configuration guidelines     14-9

disabling     14-13

enabling     14-13

overview     14-4

W

weighted tail drop

See WTD

wizards     1-2

WTD

described     33-14

setting thresholds

egress queue-sets     33-72

ingress queues     33-68

support for     1-9

X

Xmodem protocol     41-2