Numerics -
A -
B -
C -
D -
E -
F -
G -
H -
I -
J -
K -
L -
M -
N -
O -
P -
Q -
R -
S -
T -
U -
V -
W -
X -
Index
Numerics
10-Gigabit Ethernet interfaces
configuration guidelines 11-17
defined 11-6
3750G integrated wireless LAN controller switch
configuring the switch A-4
controller and switch interaction A-3
internal ports
configuring A-4
reconfiguring A-5
A
AAA down policy, NAC Layer 2 IP validation 1-10
abbreviating commands 2-4
ABRs 37-25
AC (command switch) 6-10
access-class command 34-20
access control entries
See ACEs
access control entry (ACE) 40-3
access-denied response, VMPS 13-28
access groups
applying IPv4 ACLs to interfaces 34-21
Layer 2 34-21
Layer 3 34-21
accessing
clusters, switch 6-13
command switches 6-11
member switches 6-13
switch clusters 6-13
accessing stack members 5-23
access lists
See ACLs
access ports
and Layer 2 protocol tunneling 17-11
defined 11-3
in switch clusters 6-9
access template 8-1
accounting
with 802.1x 10-39
with IEEE 802.1x 10-9
with RADIUS 9-28
with TACACS+ 9-11, 9-17
ACEs
and QoS 35-6
defined 34-2
Ethernet 34-2
IP 34-2
ACLs
ACEs 34-2
any keyword 34-13
applying
on bridged packets 34-38
on multicast packets 34-40
on routed packets 34-39
on switched packets 34-38
time ranges to 34-17
to an interface 34-20, 40-7
to IPv6 interfaces 40-7
to QoS 35-6
classifying traffic for QoS 35-43
comments in 34-19
compiling 34-22
defined 34-1, 34-8
examples of 34-22, 35-43
extended IP, configuring for QoS classification 35-44
extended IPv4
creating 34-11
matching criteria 34-8
hardware and software handling 34-22
host keyword 34-13
IP
creating 34-8
fragments and QoS guidelines 35-33
implicit deny 34-10, 34-14, 34-16
implicit masks 34-10
matching criteria 34-8
undefined 34-21
IPv4
applying to interfaces 34-20
creating 34-8
matching criteria 34-8
named 34-15
numbers 34-8
terminal lines, setting on 34-19
unsupported features 34-7
IPv6
and stacking 40-3
applying to interfaces 40-7
configuring 40-4, 40-5
displaying 40-8
interactions with other features 40-4
limitations 40-3
matching criteria 40-3
named 40-3
precedence of 40-2
supported 40-2
unsupported features 40-3
Layer 4 information in 34-37
logging messages 34-9
MAC extended 34-27, 35-45
matching 34-8, 34-21, 40-3
monitoring 34-40, 40-8
named, IPv4 34-15
named, IPv6 40-3
names 40-4
number per QoS class map 35-33
port 34-2, 40-1
precedence of 34-2
QoS 35-6, 35-43
resequencing entries 34-15
router 34-2, 40-1
router ACLs and VLAN map configuration guidelines 34-37
standard IP, configuring for QoS classification 35-43
standard IPv4
creating 34-10
matching criteria 34-8
support for 1-9
support in hardware 34-22
time ranges 34-17
types supported 34-2
unsupported features, IPv4 34-7
unsupported features, IPv6 40-3
using router ACLs with VLAN maps 34-36
VLAN maps
configuration guidelines 34-30
configuring 34-29
active link 21-4, 21-5, 21-6
active links 21-2
active router 41-1
active traffic monitoring, IP SLAs 42-1
address aliasing 24-2
addresses
displaying the MAC address table 7-27
dynamic
accelerated aging 18-9
changing the aging time 7-21
default aging 18-9
defined 7-19
learning 7-20
removing 7-22
IPv6 38-2
MAC, discovering 7-27
multicast
group address range 45-3
STP address management 18-9
static
adding and removing 7-24
defined 7-19
address resolution 7-27, 37-9
Address Resolution Protocol
See ARP
adjacency tables, with CEF 37-79
administrative distances
defined 37-91
OSPF 37-32
routing protocol defaults 37-81
advanced IP services image 38-1
advertisements
CDP 26-1
LLDP 27-2
RIP 37-20
VTP 13-19, 14-3
aggregatable global unicast addresses 38-3
aggregate addresses, BGP 37-60
aggregated ports
See EtherChannel
aggregate policers 35-59
aggregate policing 1-11
aggregator template 5-9, 8-2
aging, accelerating 18-9
aging time
accelerated
for MSTP 19-23
for STP 18-9, 18-23
MAC address table 7-21
maximum
for MSTP 19-24
for STP 18-23, 18-24
alarms, RMON 30-3
allowed-VLAN list 13-21
AP1250 (Cisco wireless access point) 11-7
application engines, redirecting traffic to 44-1
area border routers
See ABRs
ARP
configuring 37-10
defined 1-6, 7-27, 37-9
encapsulation 37-11
static cache configuration 37-10
table
address resolution 7-27
managing 7-27
ASBRs 37-25
AS-path filters, BGP 37-54
asymmetrical links, and IEEE 802.1Q tunneling 17-4
attributes, RADIUS
vendor-proprietary 9-31
vendor-specific 9-29
authentication
EIGRP 37-40
HSRP 41-10
local mode with AAA 9-36
NTP associations 7-4
RADIUS
key 9-21
login 9-23
TACACS+
defined 9-11
key 9-13
login 9-14
See also port-based authentication
authentication failed VLAN
See restricted VLAN
authentication keys, and routing protocols 37-92
authoritative time source, described 7-2
authorization
with RADIUS 9-27
with TACACS+ 9-11, 9-16
authorized ports with IEEE 802.1x 10-7
autoconfiguration 3-3
automatic advise (auto-advise) in switch stacks 5-11
automatic copy (auto-copy) in switch stacks 5-11
automatic discovery
considerations
beyond a noncandidate device 6-8
brand new switches 6-9
connectivity 6-5
different VLANs 6-7
management VLANs 6-7
non-CDP-capable devices 6-6
noncluster-capable devices 6-6
routed ports 6-8
in switch clusters 6-5
See also CDP
automatic extraction (auto-extract) in switch stacks 5-11
automatic QoS
See QoS
automatic recovery, clusters 6-10
See also HSRP
automatic upgrades (auto-upgrade) in switch stacks 5-11
auto-MDIX
configuring 11-21
described 11-21
autonegotiation
duplex mode 1-4
interface configuration guidelines 11-18
mismatches 48-12
autonomous system boundary routers
See ASBRs
autonomous systems, in BGP 37-48
Auto-RP, described 45-6
autosensing, port speed 1-4
autostate exclude 11-6
auxiliary VLAN
See voice VLAN
availability, features 1-7
B
BackboneFast
described 20-7
disabling 20-17
enabling 20-16
support for 1-7
backup interfaces
See Flex Links
backup links 21-2
backup static routing, configuring 43-12
banners
configuring
login 7-18
message-of-the-day login 7-18
default configuration 7-17
when displayed 7-17
Berkeley r-tools replacement 9-48
BGP
aggregate addresses 37-60
aggregate routes, configuring 37-60
CIDR 37-60
clear commands 37-63
community filtering 37-57
configuring neighbors 37-58
default configuration 37-45
described 37-44
enabling 37-48
monitoring 37-63
multipath support 37-52
neighbors, types of 37-48
path selection 37-52
peers, configuring 37-58
prefix filtering 37-56
resetting sessions 37-50
route dampening 37-62
route maps 37-54
route reflectors 37-61
routing domain confederation 37-61
routing session with multi-VRF CE 37-74
show commands 37-63
supernets 37-60
support for 1-12
Version 4 37-45
binding cluster group and HSRP group 41-12
binding database
address, DHCP server
See DHCP, Cisco IOS server database
DHCP snooping
See DHCP snooping binding database
bindings
address, Cisco IOS DHCP server 22-6
DHCP snooping database 22-6
IP source guard 22-16
binding table, DHCP snooping
See DHCP snooping binding database
blocking packets 25-7
Boolean expressions in tracked lists 43-4
booting
boot loader, function of 3-2
boot process 3-2
manually 3-18
specific image 3-19
boot loader
accessing 3-19
described 3-2
environment variables 3-19
prompt 3-19
trap-door mechanism 3-2
bootstrap router (BSR), described 45-7
Border Gateway Protocol
See BGP
BPDU
error-disabled state 20-2
filtering 20-3
RSTP format 19-12
BPDU filtering
described 20-3
disabling 20-15
enabling 20-14
support for 1-8
BPDU guard
described 20-2
disabling 20-14
enabling 20-13
support for 1-8
bridged packets, ACLs on 34-38
bridge groups
See fallback bridging
bridge protocol data unit
See BPDU
broadcast flooding 37-17
broadcast packets
directed 37-14
flooded 37-14
broadcast storm-control command 25-4
broadcast storms 25-1, 37-14
C
cables, monitoring for unidirectional links 28-1
candidate switch
automatic discovery 6-5
defined 6-4
requirements 6-4
See also command switch, cluster standby group, and member switch
Catalyst 3750G wireless LAN controller switch
accessing the controller A-6
displaying controller information A-7
features A-2
interaction with the controller A-3
internal port configuration A-4
internal port EtherChannel A-4
internal ports A-3
internal VLAN A-3
reconfiguring the internal ports A-5
switch stacks A-2
CA trustpoint
configuring 9-45
defined 9-42
CDP
and trusted boundary 35-39
automatic discovery in switch clusters 6-5
configuring 26-2
default configuration 26-2
defined with LLDP 27-1
described 26-1
disabling for routing device26-3to 26-4
enabling and disabling
on an interface 26-4
on a switch 26-3
Layer 2 protocol tunneling 17-7
monitoring 26-5
overview 26-1
power negotiation extensions 11-7
support for 1-6
switch stack considerations 26-2
transmission timer and holdtime, setting 26-2
updates 26-2
CEF
defined 37-79
distributed 37-79
enabling 37-80
IPv6 38-18
CGMP
as IGMP snooping learning method 24-9
clearing cached group entries 45-61
enabling server support 45-44
joining multicast group 24-3
overview 45-9
server support only 45-9
switch support of 1-4
CIDR 37-60
CipherSuites 9-44
Cisco 7960 IP Phone 15-1
Cisco AP1250 wireless access point 11-7
Cisco Discovery Protocol
See CDP
Cisco Express Forwarding
See CEF
Cisco Group Management Protocol
See CGMP
Cisco intelligent power management 11-7
Cisco IOS DHCP server
See DHCP, Cisco IOS DHCP server
Cisco IOS File System
See IFS
Cisco IOS IP SLAs 42-1
Cisco StackWise technology 1-3
See also stacks, switch
CiscoWorks 2000 1-5, 32-4
CIST regional root
See MSTP
CIST root
See MSTP
civic location 27-3
classless interdomain routing
See CIDR
classless routing 37-8
class maps for QoS
configuring 35-46
described 35-7
displaying 35-79
class of service
See CoS
clearing interfaces 11-31
CLI
abbreviating commands 2-4
command modes 2-1
configuration logging 2-5
described 1-5
editing features
enabling and disabling 2-7
keystroke editing 2-7
wrapped lines 2-9
error messages 2-5
filtering command output 2-10
getting help 2-3
history
changing the buffer size 2-6
described 2-6
disabling 2-7
recalling commands 2-6
managing clusters 6-16
no and default forms of commands 2-4
client mode, VTP 14-3
client processes, tracking 43-1
clock
See system clock
clusters, switch
accessing 6-13
automatic discovery 6-5
automatic recovery 6-10
benefits 1-2
compatibility 6-4
described 6-1
LRE profile considerations 6-16
managing
through CLI 6-16
through SNMP 6-17
planning 6-4
planning considerations
automatic discovery 6-5
automatic recovery 6-10
CLI 6-16
host names 6-13
IP addresses 6-13
LRE profiles 6-16
passwords 6-13
RADIUS 6-15
SNMP 6-14, 6-17
switch stacks 6-14
TACACS+ 6-15
See also candidate switch, command switch, cluster standby group, member switch, and standby command switch
cluster standby group
and HSRP group 41-12
automatic recovery 6-12
considerations 6-11
defined 6-2
requirements 6-3
virtual IP address 6-11
See also HSRP
CNS 1-5
Configuration Engine
configID, deviceID, hostname 4-3
configuration service 4-2
described 4-1
event service 4-3
embedded agents
described 4-5
enabling automated configuration 4-6
enabling configuration agent 4-8
enabling event agent 4-7
management functions 1-5
Coarse Wave Division Multiplexer
See CWDM SFPs
command-line interface
See CLI
command modes 2-1
commands
abbreviating 2-4
no and default 2-4
commands, setting privilege levels 9-8
command switch
accessing 6-11
active (AC) 6-10
configuration conflicts 48-12
defined 6-2
passive (PC) 6-10
password privilege levels 6-16
priority 6-10
recovery
from command-switch failure 6-10, 48-8
from lost member connectivity 48-12
redundant 6-10
replacing
with another switch 48-10
with cluster member 48-9
requirements 6-3
standby (SC) 6-10
See also candidate switch, cluster standby group, member switch, and standby command switch
community list, BGP 37-57
community ports 16-2
community strings
configuring 6-14, 32-8
for cluster switches 32-4
in clusters 6-14
overview 32-4
SNMP 6-14
community VLANs 16-2, 16-3
compatibility, feature 25-12
compatibility, software
See stacks, switch
config.text 3-17
configurable leave timer, IGMP 24-6
configuration, initial
defaults 1-14
Express Setup 1-2
configuration changes, logging 31-11
configuration conflicts, recovering from lost member connectivity 48-12
configuration examples, network 1-17
configuration files
archiving C-19
clearing the startup configuration C-19
creating using a text editor C-10
default name 3-17
deleting a stored configuration C-19
described C-8
downloading
automatically 3-17
preparing C-10, C-13, C-16
reasons for C-8
using FTP C-13
using RCP C-17
using TFTP C-11
guidelines for creating and using C-9
guidelines for replacing and rolling back C-20
invalid combinations when copying C-5
limiting TFTP server access 32-16
obtaining with DHCP 3-9
password recovery disable considerations 9-5
replacing a running configuration C-19, C-20
rolling back a running configuration C-19, C-20
specifying the filename 3-17
system contact and location information 32-16
types and location C-10
uploading
preparing C-10, C-13, C-16
reasons for C-9
using FTP C-14
using RCP C-18
using TFTP C-12
configuration guidelines, multi-VRF CE 37-67
configuration logger 31-11
configuration logging 2-5
configuration replacement C-19
configuration rollback C-19
configuration settings, saving 3-15
configure terminal command 11-12
configuring port-based authentication violation modes10-31to 10-32
configuring small-frame arrival rate 25-5
config-vlan mode 2-2, 13-7
conflicts, configuration 48-12
connections, secure remote 9-37
connectivity problems 48-14, 48-15, 48-17
consistency checks in VTP Version 2 14-4
console port, connecting to 2-11
content-routing technology
See WCCP
control protocol, IP SLAs 42-4
corrupted software, recovery steps with Xmodem 48-2
CoS
in Layer 2 frames 35-2
override priority 15-6
trust priority 15-6
CoS input queue threshold map for QoS 35-16
CoS output queue threshold map for QoS 35-18
CoS-to-DSCP map for QoS 35-61
counters, clearing interface 11-31
crashinfo file 48-24
critical authentication, IEEE 802.1x 10-43
cross-stack EtherChannel
configuration guidelines 36-13
configuring
on Layer 2 interfaces 36-13
on Layer 3 physical interfaces 36-16
described 36-3
illustration 36-4
support for 1-7
cross-stack UplinkFast, STP
described 20-5
disabling 20-16
enabling 20-16
fast-convergence events 20-7
Fast Uplink Transition Protocol 20-6
normal-convergence events 20-7
support for 1-7
cryptographic software image
Kerberos 9-32
SSH 9-37
SSL 9-42
switch stack considerations 5-2, 5-16, 9-38
customer edge devices 37-65
CWDM SFPs 1-27
D
daylight saving time 7-13
dCEF, in the switch stack 37-79
debugging
enabling all system diagnostics 48-21
enabling for a specific feature 48-20
redirecting error message output 48-21
using commands 48-20
default commands 2-4
default configuration
802.1x 10-25
auto-QoS 35-20
banners 7-17
BGP 37-45
booting 3-17
CDP 26-2
DHCP 22-8
DHCP option 82 22-8
DHCP snooping 22-8
DHCP snooping binding database 22-9
DNS 7-16
dynamic ARP inspection 23-5
EIGRP 37-36
EtherChannel 36-11
Ethernet interfaces 11-16
fallback bridging 47-3
Flex Links 21-7, 21-8
HSRP 41-5
IEEE 802.1Q tunneling 17-4
IGMP 45-38
IGMP filtering 24-25
IGMP snooping 24-7, 39-5, 39-6
IGMP throttling 24-25
initial switch information 3-3
IP addressing, IP routing 37-6
IP multicast routing 45-10
IP SLAs 42-6
IP source guard 22-17
IPv6 38-10
Layer 2 interfaces 11-16
Layer 2 protocol tunneling 17-11
LLDP 27-3
MAC address table 7-21
MAC address-table move update 21-8
MSDP 46-4
MSTP 19-15
multi-VRF CE 37-67
MVR 24-20
NTP 7-4
optional spanning-tree configuration 20-12
OSPF 37-26
password and privilege level 9-2
PIM 45-10
private VLANs 16-6
RADIUS 9-20
RIP 37-20
RMON 30-3
RSPAN 29-11
SDM template 8-5
SNMP 32-7
SPAN 29-11
SSL 9-44
standard QoS 35-30
STP 18-13
switch stacks 5-19
system message logging 31-4
system name and prompt 7-15
TACACS+ 9-13
UDLD 28-4
VLAN, Layer 2 Ethernet interfaces 13-19
VLANs 13-8
VMPS 13-29
voice VLAN 15-3
VTP 14-7
WCCP 44-5
default gateway 3-15, 37-12
default networks 37-82
default router preference
See DRP
default routes 37-82
default routing 37-3
deleting VLANs 13-10
denial-of-service attack 25-1
description command 11-25
designing your network, examples 1-17
desktop template 5-9, 8-2
destination addresses
in IPv4 ACLs 34-12
in IPv6 ACLs 40-5
destination-IP address-based forwarding, EtherChannel 36-9
destination-MAC address forwarding, EtherChannel 36-9
detecting indirect link failures, STP 20-8
device C-23
device discovery protocol 26-1, 27-1
device manager
benefits 1-2
described 1-2, 1-5
in-band management 1-6
upgrading a switch C-23
DHCP
Cisco IOS server database
configuring 22-14
default configuration 22-9
described 22-6
DHCP for IPv6
See DHCPv6
enabling
relay agent 22-11
server 22-10
DHCP-based autoconfiguration
client request message exchange 3-4
configuring
client side 3-4
DNS 3-7
relay device 3-8
server side 3-6
server-side 22-10
TFTP server 3-7
example 3-10
lease options
for IP address information 3-6
for receiving the configuration file 3-7
overview 3-3
relationship to BOOTP 3-4
relay support 1-6, 1-13
support for 1-5
DHCP-based autoconfiguration and image update
configuring3-11to 3-14
understanding3-5to 3-6
DHCP binding database
See DHCP snooping binding database
DHCP binding table
See DHCP snooping binding database
DHCP object tracking, configuring primary interface 43-11
DHCP option 82
circuit ID suboption 22-5
configuration guidelines 22-9
default configuration 22-8
displaying 22-15
forwarding address, specifying 22-11
helper address 22-11
overview 22-3
packet format, suboption
circuit ID 22-5
remote ID 22-5
remote ID suboption 22-5
DHCP server port-based address allocation
configuration guidelines 22-20
default configuration 22-20
described 22-19
displaying 22-22
enabling 22-20
DHCP server port-based address assignment
support for 1-6
DHCP snooping
accepting untrusted packets form edge switch 22-3, 22-13
and private VLANs 22-14
binding database
See DHCP snooping binding database
configuration guidelines 22-9
default configuration 22-8
displaying binding tables 22-15
message exchange process 22-4
option 82 data insertion 22-3
trusted interface 22-2
untrusted interface 22-2
untrusted messages 22-2
DHCP snooping binding database
adding bindings 22-14
binding file
format 22-7
location 22-6
bindings 22-6
clearing agent statistics 22-15
configuration guidelines 22-9
configuring 22-14
default configuration 22-8, 22-9
deleting
binding file 22-15
bindings 22-15
database agent 22-15
described 22-6
displaying 22-15
binding entries 22-15
status and statistics 22-15
enabling 22-14
entry 22-6
renewing database 22-15
resetting
delay value 22-15
timeout value 22-15
DHCP snooping binding table
See DHCP snooping binding database
DHCPv6
configuration guidelines 38-15
default configuration 38-15
described 38-6
enabling client function 38-17
enabling DHCPv6 server function 38-15
support for 1-13
Differentiated Services architecture, QoS 35-2
Differentiated Services Code Point 35-2
Diffusing Update Algorithm (DUAL) 37-35
directed unicast requests 1-6
directories
changing C-4
creating and removing C-4
displaying the working C-4
discovery, clusters
See automatic discovery
Distance Vector Multicast Routing Protocol
See DVMRP
distance-vector protocols 37-3
distribute-list command 37-91
DNS
and DHCP-based autoconfiguration 3-7
default configuration 7-16
displaying the configuration 7-17
in IPv6 38-4
overview 7-15
setting up 7-16
support for 1-5
DNS-based SSM mapping 45-18, 45-20
domain names
DNS 7-15
VTP 14-8
Domain Name System
See DNS
dot1q-tunnel switchport mode 13-18
double-tagged packets
IEEE 802.1Q tunneling 17-2
Layer 2 protocol tunneling 17-10
downloading
configuration files
preparing C-10, C-13, C-16
reasons for C-8
using FTP C-13
using RCP C-17
using TFTP C-11
image files
deleting old image C-27
preparing C-25, C-29, C-34
reasons for C-23
using CMS 1-3
using FTP C-30
using HTTP 1-3, C-23
using RCP C-35
using TFTP C-26
using the device manager or Network Assistant C-23
drop threshold for Layer 2 protocol packets 17-11
DRP
configuring 38-13
described 38-4
IPv6 38-4
support for 1-13
DSCP 1-11, 35-2
DSCP input queue threshold map for QoS 35-16
DSCP output queue threshold map for QoS 35-18
DSCP-to-CoS map for QoS 35-64
DSCP-to-DSCP-mutation map for QoS 35-65
DSCP transparency 35-40
DTP 1-8, 13-17
dual-action detection 36-6
DUAL finite state machine, EIGRP 37-35
dual IPv4 and IPv6 templates 8-2, 38-5, 38-6
dual protocol stacks
IPv4 and IPv6 38-5
SDM templates supporting 38-6
DVMRP
autosummarization
configuring a summary address 45-58
disabling 45-60
connecting PIM domain to DVMRP router 45-51
enabling unicast routing 45-54
interoperability
with Cisco devices 45-49
with Cisco IOS software 45-9
mrinfo requests, responding to 45-53
neighbors
advertising the default route to 45-52
discovery with Probe messages 45-49
displaying information 45-53
prevent peering with nonpruning 45-56
rejecting nonpruning 45-55
overview 45-8
routes
adding a metric offset 45-60
advertising all 45-60
advertising the default route to neighbors 45-52
caching DVMRP routes learned in report messages 45-54
changing the threshold for syslog messages 45-57
deleting 45-61
displaying 45-62
favoring one over another 45-60
limiting the number injected into MBONE 45-57
limiting unicast route advertisements 45-49
routing table 45-9
source distribution tree, building 45-9
support for 1-13
tunnels
configuring 45-51
displaying neighbor information 45-53
dynamic access ports
characteristics 13-3
configuring 13-30
defined 11-3
dynamic addresses
See addresses
dynamic ARP inspection
ARP cache poisoning 23-1
ARP requests, described 23-1
ARP spoofing attack 23-1
clearing
log buffer 23-16
statistics 23-15
configuration guidelines 23-6
configuring
ACLs for non-DHCP environments 23-8
in DHCP environments 23-7
log buffer 23-13
rate limit for incoming ARP packets 23-4, 23-11
default configuration 23-5
denial-of-service attacks, preventing 23-11
described 23-1
DHCP snooping binding database 23-2
displaying
ARP ACLs 23-15
configuration and operating state 23-15
log buffer 23-16
statistics 23-15
trust state and rate limit 23-15
error-disabled state for exceeding rate limit 23-4
function of 23-2
interface trust states 23-3
log buffer
clearing 23-16
configuring 23-13
displaying 23-16
logging of dropped packets, described 23-5
man-in-the middle attack, described 23-2
network security issues and interface trust states 23-3
priority of ARP ACLs and DHCP snooping entries 23-4
rate limiting of ARP packets
configuring 23-11
described 23-4
error-disabled state 23-4
statistics
clearing 23-15
displaying 23-15
validation checks, performing 23-12
dynamic auto trunking mode 13-18
dynamic desirable trunking mode 13-18
Dynamic Host Configuration Protocol
See DHCP-based autoconfiguration
dynamic port VLAN membership
described 13-28
reconfirming 13-31
troubleshooting 13-33
types of connections 13-30
dynamic routing 37-3
Dynamic Trunking Protocol
See DTP
E
EBGP 37-43
editing features
enabling and disabling 2-7
keystrokes used 2-7
wrapped lines 2-9
EIGRP
authentication 37-40
components 37-35
configuring 37-39
default configuration 37-36
definition 37-35
interface parameters, configuring 37-40
monitoring 37-42
stub routing 37-41
elections
See stack master
ELIN location 27-3
embedded event manager
actions 33-3
configuring 33-1, 33-5
displaying information 33-7
environmental variables 33-4
event detectors 33-2
policies 33-4
registering and defining an applet 33-5
registering and defining a TCL script 33-6
understanding 33-1
enable password 9-3
enable secret password 9-3
encryption, CipherSuite 9-44
encryption for passwords 9-3
Enhanced IGRP
See EIGRP
enhanced object tracking
backup static routing 43-12
commands 43-1
defined 43-1
DHCP primary interface 43-11
HSRP 43-7
IP routing state 43-2
IP SLAs 43-9
line-protocol state 43-2
network monitoring with IP SLAs 43-11
routing policy, configuring 43-12
static route primary interface 43-10
tracked lists 43-3
enhanced object tracking static routing 43-10
enhanced PoE 11-7
environmental variables, embedded event manager 33-4
environment variables, function of 3-20
equal-cost routing 1-12, 37-80
error-disabled state, BPDU 20-2
error messages during command entry 2-5
EtherChannel
automatic creation of 36-5, 36-7
channel groups
binding physical and logical interfaces 36-4
numbering of 36-4
configuration guidelines 36-12
configuring
Layer 2 interfaces 36-13
Layer 3 physical interfaces 36-16
Layer 3 port-channel logical interfaces 36-15
default configuration 36-11
described 36-2
displaying status 36-23
forwarding methods 36-8, 36-18
IEEE 802.3ad, described 36-7
interaction
with STP 36-12
with VLANs 36-12
LACP
described 36-7
displaying status 36-23
hot-standby ports 36-20
interaction with other features 36-8
modes 36-7
port priority 36-22
system priority 36-21
Layer 3 interface 37-5
load balancing 36-8, 36-18
logical interfaces, described 36-4
PAgP
aggregate-port learners 36-19
compatibility with Catalyst 1900 36-19
described 36-5
displaying status 36-23
interaction with other features 36-7
interaction with virtual switches 36-6
learn method and priority configuration 36-19
modes 36-6
support for 1-4
with dual-action detection 36-6
port-channel interfaces
described 36-4
numbering of 36-4
port groups 11-6
stack changes, effects of 36-10
support for 1-4
EtherChannel guard
described 20-10
disabling 20-17
enabling 20-17
Ethernet VLANs
adding 13-9
defaults and ranges 13-8
modifying 13-9
EUI 38-3
event detectors, embedded event manager 33-2
events, RMON 30-3
examples
network configuration 1-17
expedite queue for QoS 35-78
Express Setup 1-2
See also getting started guide
extended crashinfo file 48-24
extended-range VLANs
configuration guidelines 13-13
configuring 13-12
creating 13-14
creating with an internal VLAN ID 13-15
defined 13-1
extended system ID
MSTP 19-17
STP 18-4, 18-16
extended universal identifier
See EUI
Extensible Authentication Protocol over LAN 10-1
external BGP
See EBGP
external neighbors, BGP 37-48
F
fa0 interface 1-7
failover support 1-7
fallback bridging
and protected ports 47-4
bridge groups
creating 47-4
described 47-2
displaying 47-11
function of 47-2
number supported 47-5
removing 47-5
bridge table
clearing 47-11
displaying 47-11
configuration guidelines 47-4
connecting interfaces with 11-10
default configuration 47-3
described 47-1
frame forwarding
flooding packets 47-2
forwarding packets 47-2
overview 47-1
protocol, unsupported 47-4
stack changes, effects of 47-3
STP
disabling on an interface 47-10
forward-delay interval 47-9
hello BPDU interval 47-8
interface priority 47-7
keepalive messages 18-2
maximum-idle interval 47-9
path cost 47-7
VLAN-bridge spanning-tree priority 47-6
VLAN-bridge STP 47-2
support for 1-12
SVIs and routed ports 47-1
unsupported protocols 47-4
VLAN-bridge STP 18-11
Fast Convergence 21-3
Fast Uplink Transition Protocol 20-6
features, incompatible 25-12
FIB 37-79
fiber-optic, detecting unidirectional links 28-1
files
basic crashinfo
description 48-24
location 48-24
copying C-5
crashinfo, description 48-24
deleting C-5
displaying the contents of C-8
extended crashinfo
description 48-24
location 48-24
tar
creating C-6
displaying the contents of C-7
extracting C-7
image file format C-24
file system
displaying available file systems C-2
displaying file information C-3
local file system names C-1
network file system names C-5
setting the default C-3
filtering
in a VLAN 34-29
IPv6 traffic 40-4, 40-7
non-IP traffic 34-27
show and more command output 2-10
filtering show and more command output 2-10
filters, IP
See ACLs, IP
flash device, number of C-1
Flex Link Multicast Fast Convergence 21-3
Flex Links
configuration guidelines 21-8
configuring 21-8, 21-9
configuring preferred VLAN 21-11
configuring VLAN load balancing 21-10
default configuration 21-7
description 21-1
link load balancing 21-2
monitoring 21-14
VLANs 21-2
flooded traffic, blocking 25-8
flow-based packet classification 1-11
flowcharts
QoS classification 35-6
QoS egress queueing and scheduling 35-17
QoS ingress queueing and scheduling 35-15
QoS policing and marking 35-10
flowcontrol
configuring 11-20
described 11-20
forward-delay time
MSTP 19-23
STP 18-23
Forwarding Information Base
See FIB
forwarding nonroutable protocols 47-1
FTP
accessing MIB files B-3
configuration files
downloading C-13
overview C-12
preparing the server C-13
uploading C-14
image files
deleting old image C-32
downloading C-30
preparing the server C-29
uploading C-32
G
general query 21-5
Generating IGMP Reports 21-3
get-bulk-request operation 32-3
get-next-request operation 32-3, 32-5
get-request operation 32-3, 32-5
get-response operation 32-3
Gigabit modules
See SFPs
global configuration mode 2-2
global leave, IGMP 24-13
guest VLAN and 802.1x 10-13
guide mode 1-3
GUIs
See device manager and Network Assistant
H
hardware limitations and Layer 3 interfaces 11-27
hello time
MSTP 19-22
STP 18-22
help, for the command line 2-3
hierarchical policy maps 35-7
configuration guidelines 35-33
configuring 35-52
described 35-11
history
changing the buffer size 2-6
described 2-6
disabling 2-7
recalling commands 2-6
history table, level and number of syslog messages 31-10
host names, in clusters 6-13
host ports
configuring 16-11
kinds of 16-2
hosts, limit on dynamic ports 13-33
Hot Standby Router Protocol
See HSRP
HP OpenView 1-5
HSRP
authentication string 41-10
automatic cluster recovery 6-12
binding to cluster group 41-12
cluster standby group considerations 6-11
command-switch redundancy 1-1, 1-7
configuring 41-5
default configuration 41-5
definition 41-1
guidelines 41-6
monitoring 41-12
object tracking 43-7
overview 41-1
priority 41-8
routing redundancy 1-12
support for ICMP redirect messages 41-12
switch stack considerations 41-5
timers 41-11
tracking 41-8
See also clusters, cluster standby group, and standby command switch
HSRP for IPv6
configuring 38-24
guidelines 38-23
HTTP over SSL
see HTTPS
HTTPS 9-42
configuring 9-46
self-signed certificate 9-43
HTTP secure server 9-42
I
IBPG 37-43
ICMP
IPv6 38-4
redirect messages 37-12
support for 1-13
time-exceeded messages 48-17
traceroute and 48-17
unreachable messages 34-20
unreachable messages and IPv6 40-4
unreachables and ACLs 34-22
ICMP Echo operation
configuring 42-11
IP SLAs 42-11
ICMP ping
executing 48-14
overview 48-14
ICMP Router Discovery Protocol
See IRDP
ICMPv6 38-4
IDS appliances
and ingress RSPAN 29-22
and ingress SPAN 29-15
IEEE 802.1D
See STP
IEEE 802.1p 15-1
IEEE 802.1Q
and trunk ports 11-3
configuration limitations 13-19
encapsulation 13-16
native VLAN for untagged traffic 13-23
tunneling
compatibility with other features 17-6
defaults 17-4
described 17-1
tunnel ports with other features 17-6
IEEE 802.1s
See MSTP
IEEE 802.1w
See RSTP
IEEE 802.1x
See port-based authentication
IEEE 802.3ad
See EtherChannel
IEEE 802.3af
See PoE
IEEE 802.3x flow control 11-20
ifIndex values, SNMP 32-6
IFS 1-6
IGMP
configurable leave timer
described 24-6
enabling 24-11
configuring the switch
as a member of a group 45-39
statically connected member 45-43
controlling access to groups 45-40
default configuration 45-38
deleting cache entries 45-62
displaying groups 45-62
fast switching 45-43
flooded multicast traffic
controlling the length of time 24-12
disabling on an interface 24-13
global leave 24-13
query solicitation 24-13
recovering from flood mode 24-13
host-query interval, modifying 45-41
joining multicast group 24-3
join messages 24-3
leave processing, enabling 24-11, 39-9
leaving multicast group 24-5
multicast reachability 45-39
overview 45-3
queries 24-4
report suppression
described 24-6
disabling 24-16, 39-11
supported versions 24-3
support for 1-4
Version 1
changing to Version 2 45-41
described 45-3
Version 2
changing to Version 1 45-41
described 45-3
maximum query response time value 45-43
pruning groups 45-43
query timeout value 45-42
IGMP filtering
configuring 24-25
default configuration 24-25
described 24-24
monitoring 24-29
support for 1-4
IGMP groups
configuring filtering 24-28
setting the maximum number 24-27
IGMP helper 1-4, 45-6
IGMP Immediate Leave
configuration guidelines 24-11
described 24-5
enabling 24-11
IGMP profile
applying 24-26
configuration mode 24-25
configuring 24-26
IGMP snooping
and address aliasing 24-2
and stack changes 24-7
configuring 24-7
default configuration 24-7, 39-5, 39-6
definition 24-2
enabling and disabling 24-8, 39-6
global configuration 24-8
Immediate Leave 24-5
in the switch stack 24-6
method 24-8
monitoring 24-16, 39-11
querier
configuration guidelines 24-14
configuring 24-14
supported versions 24-3
support for 1-4
VLAN configuration 24-8
IGMP throttling
configuring 24-28
default configuration 24-25
described 24-25
displaying action 24-29
IGP 37-25
Immediate Leave, IGMP 24-5
enabling 39-9
inaccessible authentication bypass 10-15
initial configuration
defaults 1-14
Express Setup 1-2
integrated wireless LAN controller switch
see 3750G integrated wireless LAN controller switch
interface
number 11-11
range macros 11-14
interface command11-11to 11-12
interface configuration mode 2-3
interfaces
auto-MDIX, configuring 11-21
configuration guidelines
10-Gigabit Ethernet 11-17
duplex and speed 11-18
configuring
procedure 11-12
counters, clearing 11-31
default configuration 11-16
described 11-25
descriptive name, adding 11-25
displaying information about 11-30
flow control 11-20
management 1-5
monitoring 11-30
naming 11-25
physical, identifying 11-11
range of 11-12
restarting 11-32
shutting down 11-32
speed and duplex, configuring 11-18
status 11-30
supported 11-11
types of 11-1
interfaces range macro command 11-14
interface types 11-11
Interior Gateway Protocol
See IGP
internal BGP
See IBGP
internal neighbors, BGP 37-48
Internet Control Message Protocol
See ICMP
Internet Group Management Protocol
See IGMP
Internet Protocol version 6
See IPv6
Inter-Switch Link
See ISL
inter-VLAN routing 1-12, 37-2
Intrusion Detection System
See IDS appliances
inventory management TLV 27-2, 27-6
IP ACLs
for QoS classification 35-6
implicit deny 34-10, 34-14
implicit masks 34-10
named 34-15
undefined 34-21
IP addresses
128-bit 38-2
candidate or member 6-4, 6-13
classes of 37-7
cluster access 6-2
command switch 6-3, 6-11, 6-13
default configuration 37-6
discovering 7-27
for IP routing 37-5
IPv6 38-2
MAC address association 37-9
monitoring 37-18
redundant clusters 6-11
standby command switch 6-11, 6-13
See also IP information
IP base image 1-1
IP broadcast address 37-16
ip cef distributed command 37-79
IP directed broadcasts 37-14
ip igmp profile command 24-25
IP information
assigned
manually 3-14
through DHCP-based autoconfiguration 3-3
default configuration 3-3
IP multicast routing
addresses
all-hosts 45-3
all-multicast-routers 45-3
host group address range 45-3
administratively-scoped boundaries, described 45-46
and IGMP snooping 24-2
Auto-RP
adding to an existing sparse-mode cloud 45-26
benefits of 45-26
clearing the cache 45-62
configuration guidelines 45-12
filtering incoming RP announcement messages 45-29
overview 45-6
preventing candidate RP spoofing 45-29
preventing join messages to false RPs 45-28
setting up in a new internetwork 45-26
using with BSR 45-34
bootstrap router
configuration guidelines 45-12
configuring candidate BSRs 45-32
configuring candidate RPs 45-33
defining the IP multicast boundary 45-31
defining the PIM domain border 45-30
overview 45-7
using with Auto-RP 45-34
Cisco implementation 45-2
configuring
basic multicast routing 45-12
IP multicast boundary 45-46
default configuration 45-10
enabling
multicast forwarding 45-13
PIM mode 45-13
group-to-RP mappings
Auto-RP 45-6
BSR 45-7
MBONE
deleting sdr cache entries 45-62
described 45-45
displaying sdr cache 45-63
enabling sdr listener support 45-46
limiting DVMRP routes advertised 45-57
limiting sdr cache entry lifetime 45-46
SAP packets for conference session announcement 45-45
Session Directory (sdr) tool, described 45-45
monitoring
packet rate loss 45-63
peering devices 45-63
tracing a path 45-63
multicast forwarding, described 45-7
PIMv1 and PIMv2 interoperability 45-11
protocol interaction 45-2
reverse path check (RPF) 45-7
routing table
deleting 45-62
displaying 45-62
RP
assigning manually 45-24
configuring Auto-RP 45-26
configuring PIMv2 BSR 45-30
monitoring mapping information 45-34
using Auto-RP and BSR 45-34
stacking
stack master functions 45-9
stack member functions 45-9
statistics, displaying system and network 45-62
See also CGMP
See also DVMRP
See also IGMP
See also PIM
IP phones
and QoS 15-1
automatic classification and queueing 35-20
configuring 15-4
ensuring port security with QoS 35-38
trusted boundary for QoS 35-38
IP precedence 35-2
IP-precedence-to-DSCP map for QoS 35-62
IP protocols
in ACLs 34-12
routing 1-12
IP routes, monitoring 37-93
IP routing
connecting interfaces with 11-10
disabling 37-19
enabling 37-19
IP Service Level Agreements
See IP SLAs
IP service levels, analyzing 42-1
IP services image 1-1
IP SLAs
benefits 42-2
configuration guidelines 42-6
configuring object tracking 43-9
Control Protocol 42-4
default configuration 42-6
definition 42-1
ICMP echo operation 42-11
measuring network performance 42-3
monitoring 42-13
multioperations scheduling 42-5
object tracking 43-9
operation 42-3
reachability tracking 43-9
responder
described 42-4
enabling 42-8
response time 42-4
scheduling 42-5
SNMP support 42-2
supported metrics 42-2
threshold monitoring 42-6
track object monitoring agent, configuring 43-11
track state 43-9
UDP jitter operation 42-8
IP source guard
and 802.1x 22-18
and DHCP snooping 22-16
and EtherChannels 22-18
and port security 22-17
and private VLANs 22-18
and routed ports 22-17
and TCAM entries 22-18
and trunk interfaces 22-17
and VRF 22-18
binding configuration
automatic 22-16
manual 22-16
binding table 22-16
configuration guidelines 22-17
default configuration 22-17
described 22-16
disabling 22-19
displaying
bindings 22-19
configuration 22-19
enabling 22-18
filtering
source IP address 22-16
source IP and MAC address 22-17
on provisioned switches 22-18
source IP address filtering 22-16
source IP and MAC address filtering 22-17
static bindings
adding 22-18
deleting 22-19
IP traceroute
executing 48-18
overview 48-17
IP unicast routing
address resolution 37-9
administrative distances 37-81, 37-91
ARP 37-9
assigning IP addresses to Layer 3 interfaces 37-7
authentication keys 37-92
broadcast
address 37-16
flooding 37-17
packets 37-14
storms 37-14
classless routing 37-8
configuring static routes 37-81
default
addressing configuration 37-6
gateways 37-12
networks 37-82
routes 37-82
routing 37-3
directed broadcasts 37-14
disabling 37-19
dynamic routing 37-3
enabling 37-19
EtherChannel Layer 3 interface 37-5
IGP 37-25
inter-VLAN 37-2
IP addressing
classes 37-7
configuring 37-5
IPv6 38-3
IRDP 37-12
Layer 3 interfaces 37-5
MAC address and IP address 37-9
passive interfaces 37-90
protocols
distance-vector 37-3
dynamic 37-3
link-state 37-3
proxy ARP 37-9
redistribution 37-83
reverse address resolution 37-9
routed ports 37-5
static routing 37-3
steps to configure 37-5
subnet mask 37-7
subnet zero 37-7
supernet 37-8
UDP 37-15
with SVIs 37-5
See also BGP
See also EIGRP
See also OSPF
See also RIP
IPv4 ACLs
applying to interfaces 34-20
extended, creating 34-11
named 34-15
standard, creating 34-10
IPv4 and IPv6
dual protocol stacks 38-5
IPv6
ACLs
displaying 40-8
limitations 40-3
matching criteria 40-3
port 40-1
precedence 40-2
router 40-1
supported 40-2
addresses 38-2
address formats 38-2
and switch stacks 38-9
applications 38-5
assigning address 38-11
autoconfiguration 38-5
CEFv6 38-18
configuring static routes 38-19
default configuration 38-10
default router preference (DRP) 38-4
defined 38-1
Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 38-7
EIGRP IPv6 Commands 38-7
Router ID 38-7
feature limitations 38-8
features not supported 38-8
forwarding 38-11
ICMP 38-4
monitoring 38-26
neighbor discovery 38-4
OSPF 38-6
path MTU discovery 38-4
SDM templates 8-2, 39-1, 40-1
stack master functions 38-9
Stateless Autoconfiguration 38-5
supported features 38-2
switch limitations 38-8
understanding static routes 38-6
IPv6 traffic, filtering 40-4
IRDP
configuring 37-13
definition 37-12
support for 1-13
ISL
and IPv6 38-3
and trunk ports 11-3
encapsulation 1-8, 13-16
trunking with IEEE 802.1 tunneling 17-4
isolated port 16-2
isolated VLANs 16-2, 16-3
J
join messages, IGMP 24-3
K
KDC
described 9-32
See also Kerberos
keepalive messages 18-2
Kerberos
authenticating to
boundary switch 9-34
KDC 9-34
network services 9-35
configuration examples 9-32
configuring 9-35
credentials 9-32
cryptographic software image 9-32
described 9-32
KDC 9-32
operation 9-34
realm 9-33
server 9-33
support for 1-11
switch as trusted third party 9-32
terms 9-33
TGT 9-34
tickets 9-32
key distribution center
See KDC
L
l2protocol-tunnel command 17-13
LACP
Layer 2 protocol tunneling 17-9
See EtherChannel
LAN base image 40-1
Layer 2 frames, classification with CoS 35-2
Layer 2 interfaces, default configuration 11-16
Layer 2 protocol tunneling
configuring 17-10
configuring for EtherChannels 17-14
default configuration 17-11
defined 17-8
guidelines 17-12
Layer 2 traceroute
and ARP 48-16
and CDP 48-16
broadcast traffic 48-16
described 48-16
IP addresses and subnets 48-16
MAC addresses and VLANs 48-16
multicast traffic 48-16
multiple devices on a port 48-17
unicast traffic 48-16
usage guidelines 48-16
Layer 3 features 1-12
Layer 3 interfaces
assigning IP addresses to 37-7
assigning IPv4 and IPv6 addresses to 38-14
assigning IPv6 addresses to 38-11
changing from Layer 2 mode 37-7, 37-71, 37-72
types of 37-5
Layer 3 packets, classification methods 35-2
LDAP 4-2
Leaking IGMP Reports 21-4
LEDs, switch
See hardware installation guide
lightweight directory access protocol
See LDAP
line configuration mode 2-3
Link Aggregation Control Protocol
See EtherChannel
link failure, detecting unidirectional 19-8
Link Layer Discovery Protocol
See CDP
link local unicast addresses 38-3
link redundancy
See Flex Links
links, unidirectional 28-1
link state advertisements (LSAs) 37-30
link-state protocols 37-3
link-state tracking
configuring 36-25
described 36-23
LLDP
configuring 27-3
characteristics 27-4
default configuration 27-3
disabling and enabling
globally 27-4
on an interface 27-5
monitoring and maintaining 27-7
overview 27-1
supported TLVs 27-2
switch stack considerations 27-2
transmission timer and holdtime, setting 27-4
LLDP-MED
configuring
procedures 27-3
TLVs 27-6
monitoring and maintaining 27-7
overview 27-1, 27-2
supported TLVs 27-2
LLDP Media Endpoint Discovery
See LLDP-MED
load balancing 41-4
local SPAN 29-2
location TLV 27-2, 27-6
logging messages, ACL 34-9
login authentication
with RADIUS 9-23
with TACACS+ 9-14
login banners 7-17
log messages
See system message logging
Long-Reach Ethernet (LRE) technology 1-19, 1-25
loop guard
described 20-11
enabling 20-18
support for 1-8
LRE profiles, considerations in switch clusters 6-16
M
MAB aging timer 1-9
MAB inactivity timer
default setting 10-26
range 10-28
MAC/PHY configuration status TLV 27-2
MAC addresses
aging time 7-21
and VLAN association 7-20
building the address table 7-20
default configuration 7-21
disabling learning on a VLAN 7-26
discovering 7-27
displaying 7-27
displaying in the IP source binding table 22-19
dynamic
learning 7-20
removing 7-22
in ACLs 34-27
IP address association 37-9
static
adding 7-24
allowing 7-26, 7-27
characteristics of 7-24
dropping 7-25
removing 7-24
MAC address learning 1-6
MAC address learning, disabling on a VLAN 7-26
MAC address notification, support for 1-14
MAC address-table move update
configuration guidelines 21-8
configuring 21-12
default configuration 21-8
description 21-6
monitoring 21-14
MAC address-to-VLAN mapping 13-28
MAC authentication bypass 10-10
See MAB
MAC extended access lists
applying to Layer 2 interfaces 34-28
configuring for QoS 35-45
creating 34-27
defined 34-27
for QoS classification 35-5
macros
See Smartports macros
magic packet 10-18
manageability features 1-5
management access
in-band
browser session 1-6
CLI session 1-6
device manager 1-6
SNMP 1-6
out-of-band console port connection 1-7
management address TLV 27-2
management options
CLI 2-1
clustering 1-3
CNS 4-1
Network Assistant 1-2
overview 1-5
switch stacks 1-3
management VLAN
considerations in switch clusters 6-7
discovery through different management VLANs 6-7
mapping tables for QoS
configuring
CoS-to-DSCP 35-61
DSCP 35-61
DSCP-to-CoS 35-64
DSCP-to-DSCP-mutation 35-65
IP-precedence-to-DSCP 35-62
policed-DSCP 35-63
described 35-12
marking
action with aggregate policers 35-59
described 35-4, 35-8
matching
IPv6 ACLs 40-3
matching, IPv4 ACLs 34-8
maximum aging time
MSTP 19-24
STP 18-23
maximum hop count, MSTP 19-24
maximum number of allowed devices, port-based authentication 10-28
maximum-paths command 37-52, 37-80
MDA
configuration guidelines10-20to 10-21
described 1-10, 10-20
exceptions with authentication process 10-4
membership mode, VLAN port 13-3
member switch
automatic discovery 6-5
defined 6-2
managing 6-16
passwords 6-13
recovering from lost connectivity 48-12
requirements 6-4
See also candidate switch, cluster standby group, and standby command switch
messages, to users through banners 7-17
metrics, in BGP 37-52
metric translations, between routing protocols 37-86
metro tags 17-2
MHSRP 41-4
MIBs
accessing files with FTP B-3
location of files B-3
overview 32-1
SNMP interaction with 32-4
supported B-1
mini-point-of-presence
See POP
mirroring traffic for analysis 29-1
mismatches, autonegotiation 48-12
module number 11-11
monitoring
access groups 34-40
BGP 37-63
cables for unidirectional links 28-1
CDP 26-5
CEF 37-80
EIGRP 37-42
fallback bridging 47-11
features 1-13
Flex Links 21-14
HSRP 41-12
IEEE 802.1Q tunneling 17-18
IGMP
filters 24-29
snooping 24-16, 39-11
interfaces 11-30
IP
address tables 37-18
multicast routing 45-61
routes 37-93
IP SLAs operations 42-13
IPv4 ACL configuration 34-40
IPv6 38-26
IPv6 ACL configuration 40-8
Layer 2 protocol tunneling 17-18
MAC address-table move update 21-14
MSDP peers 46-17
multicast router interfaces 24-17, 39-12
multi-VRF CE 37-78
MVR 24-24
network traffic for analysis with probe 29-2
object tracking 43-12
OSPF 37-34
port
blocking 25-19
protection 25-19
private VLANs 16-14
RP mapping information 45-34
SFP status 11-31, 48-14
source-active messages 46-17
speed and duplex mode 11-19
SSM mapping 45-22
traffic flowing among switches 30-1
traffic suppression 25-19
tunneling 17-18
VLAN
filters 34-41
maps 34-41
VLANs 13-16
VMPS 13-32
VTP 14-16
mrouter Port 21-3
mrouter port 21-5
MSDP
benefits of 46-3
clearing MSDP connections and statistics 46-18
controlling source information
forwarded by switch 46-11
originated by switch 46-8
received by switch 46-13
default configuration 46-4
dense-mode regions
sending SA messages to 46-16
specifying the originating address 46-17
filtering
incoming SA messages 46-13
SA messages to a peer 46-12
SA requests from a peer 46-10
join latency, defined 46-6
meshed groups
configuring 46-15
defined 46-15
originating address, changing 46-17
overview 46-1
peer-RPF flooding 46-2
peers
configuring a default 46-4
monitoring 46-17
peering relationship, overview 46-1
requesting source information from 46-8
shutting down 46-15
source-active messages
caching 46-6
clearing cache entries 46-18
defined 46-2
filtering from a peer 46-10
filtering incoming 46-13
filtering to a peer 46-12
limiting data with TTL 46-13
monitoring 46-17
restricting advertised sources 46-9
support for 1-13
MSTP
boundary ports
configuration guidelines 19-16
described 19-6
BPDU filtering
described 20-3
enabling 20-14
BPDU guard
described 20-2
enabling 20-13
CIST, described 19-3
CIST regional root 19-3
CIST root 19-5
configuration guidelines 19-15, 20-12
configuring
forward-delay time 19-23
hello time 19-22
link type for rapid convergence 19-24
maximum aging time 19-24
maximum hop count 19-24
MST region 19-16
neighbor type 19-25
path cost 19-21
port priority 19-20
root switch 19-17
secondary root switch 19-19
switch priority 19-22
CST
defined 19-3
operations between regions 19-4
default configuration 19-15
default optional feature configuration 20-12
displaying status 19-26
enabling the mode 19-16
EtherChannel guard
described 20-10
enabling 20-17
extended system ID
effects on root switch 19-17
effects on secondary root switch 19-19
unexpected behavior 19-18
IEEE 802.1s
implementation 19-6
port role naming change 19-7
terminology 19-5
instances supported 18-10
interface state, blocking to forwarding 20-2
interoperability and compatibility among modes 18-11
interoperability with IEEE 802.1D
described 19-9
restarting migration process 19-26
IST
defined 19-3
master 19-3
operations within a region 19-3
loop guard
described 20-11
enabling 20-18
mapping VLANs to MST instance 19-16
MST region
CIST 19-3
configuring 19-16
described 19-2
hop-count mechanism 19-5
IST 19-3
supported spanning-tree instances 19-2
optional features supported 1-8
overview 19-2
Port Fast
described 20-2
enabling 20-12
preventing root switch selection 20-10
root guard
described 20-10
enabling 20-18
root switch
configuring 19-18
effects of extended system ID 19-17
unexpected behavior 19-18
shutdown Port Fast-enabled port 20-2
stack changes, effects of 19-8
status, displaying 19-26
multicast groups
Immediate Leave 24-5
joining 24-3
leaving 24-5
static joins 24-10, 39-8
multicast packets
ACLs on 34-40
blocking 25-8
multicast router interfaces, monitoring 24-17, 39-12
multicast router ports, adding 24-9, 39-8
Multicast Source Discovery Protocol
See MSDP
multicast storm 25-1
multicast storm-control command 25-4
multicast television application 24-18
multicast VLAN 24-17
Multicast VLAN Registration
See MVR
multidomain authentication
See MDA
multioperations scheduling, IP SLAs 42-5
Multiple HSRP
See MHSRP
multiple VPN routing/forwarding in customer edge devices
See multi-VRF CE
multi-VRF CE
configuration example 37-74
configuration guidelines 37-67
configuring 37-66
default configuration 37-67
defined 37-64
displaying 37-78
monitoring 37-78
network components 37-66
packet-forwarding process 37-66
support for 1-12
MVR
and address aliasing 24-21
and IGMPv3 24-21
configuration guidelines 24-20
configuring interfaces 24-22
default configuration 24-20
described 24-17
example application 24-18
in the switch stack 24-20
modes 24-21
monitoring 24-24
multicast television application 24-18
setting global parameters 24-21
support for 1-4
N
NAC
AAA down policy 1-10
critical authentication 10-15, 10-43
IEEE 802.1x authentication using a RADIUS server 10-47
IEEE 802.1x validation using RADIUS server 10-47
inaccessible authentication bypass 1-10, 10-43
Layer 2 IEEE 802.1x validation 1-10, 10-19, 10-47
Layer 2 IP validation 1-10
named IPv4 ACLs 34-15
NameSpace Mapper
See NSM
native VLAN
and IEEE 802.1Q tunneling 17-4
configuring 13-23
default 13-23
neighbor discovery, IPv6 38-4
neighbor discovery/recovery, EIGRP 37-35
neighbors, BGP 37-58
Network Admission Control
NAC
Network Admission Control Software Configuration Guide 10-49, 10-50
Network Assistant
benefits 1-2
described 1-5
downloading image files 1-3
guide mode 1-3
management options 1-2
managing switch stacks 5-2, 5-15
upgrading a switch C-23
wizards 1-3
network configuration examples
cost-effective wiring closet 1-19
high-performance wiring closet 1-19
increasing network performance 1-17
large network 1-23
long-distance, high-bandwidth transport 1-27
multidwelling network 1-25
providing network services 1-18
redundant Gigabit backbone 1-20
server aggregation and Linux server cluster 1-21
small to medium-sized network 1-22
network design
performance 1-18
services 1-18
network management
CDP 26-1
RMON 30-1
SNMP 32-1
network performance, measuring with IP SLAs 42-3
network policy TLV 27-2, 27-6
Network Time Protocol
See NTP
no commands 2-4
nonhierarchical policy maps
configuration guidelines 35-33
described 35-8
non-IP traffic filtering 34-27
nontrunking mode 13-18
normal-range VLANs 13-4
configuration guidelines 13-6
configuration modes 13-7
configuring 13-4
defined 13-1
no switchport command 11-4
not-so-stubby areas
See NSSA
NSM 4-3
NSSA, OSPF 37-30
NTP
associations
authenticating 7-4
defined 7-2
enabling broadcast messages 7-6
peer 7-5
server 7-5
default configuration 7-4
displaying the configuration 7-11
overview 7-2
restricting access
creating an access group 7-8
disabling NTP services per interface 7-10
source IP address, configuring 7-10
stratum 7-2
support for 1-6
synchronizing devices 7-5
time
services 7-2
synchronizing 7-2
O
object tracking
HSRP 43-7
IP SLAs 43-9
IP SLAs, configuring 43-9
monitoring 43-12
offline configuration for switch stacks 5-7
online diagnostics
overview 49-1
running tests 49-3
understanding 49-1
Open Shortest Path First
See OSPF
optimizing system resources 8-1
options, management 1-5
OSPF
area parameters, configuring 37-30
configuring 37-28
default configuration
metrics 37-32
route 37-31
settings 37-26
described 37-25
for IPv6 38-6
interface parameters, configuring 37-29
LSA group pacing 37-33
monitoring 37-34
router IDs 37-33
route summarization 37-31
support for 1-12
virtual links 37-31
out-of-profile markdown 1-12
P
packet modification, with QoS 35-19
PAgP
Layer 2 protocol tunneling 17-9
See EtherChannel
parallel paths, in routing tables 37-80
passive interfaces
configuring 37-90
OSPF 37-32
passwords
default configuration 9-2
disabling recovery of 9-5
encrypting 9-3
for security 1-9
in clusters 6-13
overview 9-1
recovery of 48-3
setting
enable 9-3
enable secret 9-3
Telnet 9-6
with usernames 9-6
VTP domain 14-8
path cost
MSTP 19-21
STP 18-20
path MTU discovery 38-4
PBR
defined 37-86
enabling 37-88
fast-switched policy-based routing 37-89
local policy-based routing 37-89
PC (passive command switch) 6-10
peers, BGP 37-58
percentage thresholds in tracked lists 43-6
performance, network design 1-17
performance features 1-4
persistent self-signed certificate 9-43
per-VLAN spanning-tree plus
See PVST+
PE to CE routing, configuring 37-74
physical ports 11-2
PIM
default configuration 45-10
dense mode
overview 45-4
rendezvous point (RP), described 45-5
RPF lookups 45-8
displaying neighbors 45-62
enabling a mode 45-13
overview 45-4
router-query message interval, modifying 45-37
shared tree and source tree, overview 45-35
shortest path tree, delaying the use of 45-36
sparse mode
join messages and shared tree 45-5
overview 45-5
prune messages 45-5
RPF lookups 45-8
stub routing
configuration guidelines 45-22
displaying 45-62
enabling 45-23
overview 45-5
support for 1-13
versions
interoperability 45-11
troubleshooting interoperability problems 45-35
v2 improvements 45-4
PIM-DVMRP, as snooping method 24-9
ping
character output description 48-15
executing 48-14
overview 48-14
PoE
auto mode 11-9
CDP with power consumption, described 11-7
CDP with power negotiation, described 11-7
Cisco intelligent power management 11-7
configuring 11-22
devices supported 11-7
enhanced 11-7
supported watts per port 11-7
high-power devices operating in low-power mode 11-7
IEEE power classification levels 11-8
monitoring power 11-24
policing power consumption 11-24
power budgeting 11-23
power consumption 11-23
powered-device detection and initial power allocation 11-8
power management modes 11-9
power negotiation extensions to CDP 11-7
standards supported 11-7
static mode 11-9
supported watts per port 11-7
policed-DSCP map for QoS 35-63
policers
configuring
for each matched traffic class 35-48
for more than one traffic class 35-59
described 35-4
displaying 35-79
number of 35-34
types of 35-8
policing
described 35-4
hierarchical
See hierarchical policy maps
token-bucket algorithm 35-9
policy-based routing
See PBR
policy maps for QoS
characteristics of 35-48
described 35-7
displaying 35-80
hierarchical 35-7
hierarchical on SVIs
configuration guidelines 35-33
configuring 35-52
described 35-11
nonhierarchical on physical ports
configuration guidelines 35-33
described 35-8
POP 1-25
port ACLs
defined 34-2
types of 34-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting 10-9
authentication server
defined 10-3
RADIUS server 10-3
client, defined 10-3
configuration guidelines 10-26
configuring
802.1x authentication 10-32
guest VLAN 10-40
host mode 10-35
inaccessible authentication bypass 10-43
manual re-authentication of a client 10-36
periodic re-authentication 10-36
quiet period 10-37
RADIUS server 10-34
RADIUS server parameters on the switch 10-33
restricted VLAN 10-41
switch-to-client frame-retransmission number 10-38
switch-to-client retransmission time 10-37
violation modes10-31to 10-32
default configuration 10-25
described 10-1
device roles 10-2
displaying statistics 10-52
EAPOL-start frame 10-5
EAP-request/identity frame 10-5
EAP-response/identity frame 10-5
encapsulation 10-3
guest VLAN
configuration guidelines 10-14, 10-15
described 10-13
host mode 10-8
inaccessible authentication bypass
configuring 10-43
described 10-15
guidelines 10-28
initiation and message exchange 10-5
magic packet 10-18
maximum number of allowed devices per port 10-28
method lists 10-32
multiple-hosts mode, described 10-8
per-user ACLs
AAA authorization 10-32
configuration tasks 10-13
described 10-12
RADIUS server attributes 10-12
ports
authorization state and dot1x port-control command 10-7
authorized and unauthorized 10-7
critical 10-15
voice VLAN 10-16
port security
and voice VLAN 10-18
described 10-17
interactions 10-17
multiple-hosts mode 10-8
readiness check
configuring 10-29
described 10-10, 10-29
resetting to default values 10-51
stack changes, effects of 10-7
statistics, displaying 10-52
switch
as proxy 10-3
RADIUS client 10-3
upgrading from a previous release 10-29, 35-26
VLAN assignment
AAA authorization 10-32
characteristics 10-11
configuration tasks 10-11
described 10-10
voice aware 802.1x security
configuring 10-30
described 10-21, 10-30
voice VLAN
described 10-16
PVID 10-16
VVID 10-16
wake-on-LAN, described 10-18
port blocking 1-4, 25-7
port-channel
See EtherChannel
port description TLV 27-2
Port Fast
described 20-2
enabling 20-12
mode, spanning tree 13-29
support for 1-8
port membership modes, VLAN 13-3
port priority
MSTP 19-20
STP 18-18
ports
10-Gigabit Ethernet module 11-6
access 11-3
blocking 25-7
dynamic access 13-3
IEEE 802.1Q tunnel 13-4
protected 25-6
routed 11-4
secure 25-8
static-access 13-3, 13-11
switch 11-2
trunks 13-3, 13-16
VLAN assignments 13-11
port security
aging 25-17
and private VLANs 25-18
and QoS trusted boundary 35-38
and stacking 25-18
configuring 25-13
default configuration 25-11
described 25-8
displaying 25-19
enabling 25-18
on trunk ports 25-14
sticky learning 25-9
violations 25-10
with other features 25-11
port-shutdown response, VMPS 13-28
port VLAN ID TLV 27-2
power management TLV 27-2, 27-6
Power over Ethernet
See PoE
preemption, default configuration 21-7
preemption delay, default configuration 21-8
preferential treatment of traffic
See QoS
prefix lists, BGP 37-56
preventing unauthorized access 9-1
primary interface for object tracking, DHCP, configuring 43-11
primary interface for static routing, configuring 43-10
primary links 21-2
primary VLANs 16-1, 16-3
priority
HSRP 41-8
overriding CoS 15-6
trusting CoS 15-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches 16-4
and SDM template 16-4
and SVIs 16-5
and switch stacks 16-5
benefits of 16-1
community ports 16-2
community VLANs 16-2, 16-3
configuration guidelines 16-7, 16-8
configuration tasks 16-6
configuring 16-9
default configuration 16-6
end station access to 16-3
IP addressing 16-3
isolated port 16-2
isolated VLANs 16-2, 16-3
mapping 16-13
monitoring 16-14
ports
community 16-2
configuration guidelines 16-8
configuring host ports 16-11
configuring promiscuous ports 16-12
described 13-4
isolated 16-2
promiscuous 16-2
primary VLANs 16-1, 16-3
promiscuous ports 16-2
secondary VLANs 16-2
subdomains 16-1
traffic in 16-5
privileged EXEC mode 2-2
privilege levels
changing the default for lines 9-9
command switch 6-16
exiting 9-9
logging into 9-9
mapping on member switches 6-16
overview 9-2, 9-7
setting a command with 9-8
promiscuous ports
configuring 16-12
defined 16-2
protected ports 1-9, 25-6
protocol-dependent modules, EIGRP 37-36
Protocol-Independent Multicast Protocol
See PIM
provider edge devices 37-65
provisioned switches and IP source guard 22-18
provisioning new members for a switch stack 5-7
proxy ARP
configuring 37-11
definition 37-9
with IP routing disabled 37-12
proxy reports 21-3
pruning, VTP
disabling
in VTP domain 14-14
on a port 13-23
enabling
in VTP domain 14-14
on a port 13-22
examples 14-5
overview 14-4
pruning-eligible list
changing 13-22
for VTP pruning 14-5
VLANs 14-14
PVST+
described 18-10
IEEE 802.1Q trunking interoperability 18-11
instances supported 18-10
Q
QoS
and MQC commands 35-1
auto-QoS
categorizing traffic 35-20
configuration and defaults display 35-29
configuration guidelines 35-25
described 35-20
disabling 35-27
displaying generated commands 35-27
displaying the initial configuration 35-29
effects on running configuration 35-25
egress queue defaults 35-21
enabling for VoIP 35-27
example configuration 35-28
ingress queue defaults 35-21
list of generated commands 35-22
basic model 35-4
classification
class maps, described 35-7
defined 35-4
DSCP transparency, described 35-40
flowchart 35-6
forwarding treatment 35-3
in frames and packets 35-3
IP ACLs, described 35-5, 35-6
MAC ACLs, described 35-5, 35-6
options for IP traffic 35-5
options for non-IP traffic 35-5
policy maps, described 35-7
trust DSCP, described 35-5
trusted CoS, described 35-5
trust IP precedence, described 35-5
class maps
configuring 35-46
displaying 35-79
configuration guidelines
auto-QoS 35-25
standard QoS 35-33
configuring
aggregate policers 35-59
auto-QoS 35-20
default port CoS value 35-38
DSCP maps 35-61
DSCP transparency 35-40
DSCP trust states bordering another domain 35-40
egress queue characteristics 35-71
ingress queue characteristics 35-67
IP extended ACLs 35-44
IP standard ACLs 35-43
MAC ACLs 35-45
policy maps, hierarchical 35-52
port trust states within the domain 35-36
trusted boundary 35-38
default auto configuration 35-20
default standard configuration 35-30
displaying statistics 35-79
DSCP transparency 35-40
egress queues
allocating buffer space 35-72
buffer allocation scheme, described 35-17
configuring shaped weights for SRR 35-75
configuring shared weights for SRR 35-77
described 35-4
displaying the threshold map 35-75
flowchart 35-17
mapping DSCP or CoS values 35-74
scheduling, described 35-4
setting WTD thresholds 35-72
WTD, described 35-18
enabling globally 35-35
flowcharts
classification 35-6
egress queueing and scheduling 35-17
ingress queueing and scheduling 35-15
policing and marking 35-10
implicit deny 35-7
ingress queues
allocating bandwidth 35-69
allocating buffer space 35-69
buffer and bandwidth allocation, described 35-16
configuring shared weights for SRR 35-69
configuring the priority queue 35-70
described 35-4
displaying the threshold map 35-68
flowchart 35-15
mapping DSCP or CoS values 35-67
priority queue, described 35-16
scheduling, described 35-4
setting WTD thresholds 35-67
WTD, described 35-16
IP phones
automatic classification and queueing 35-20
detection and trusted settings 35-20, 35-38
limiting bandwidth on egress interface 35-78
mapping tables
CoS-to-DSCP 35-61
displaying 35-79
DSCP-to-CoS 35-64
DSCP-to-DSCP-mutation 35-65
IP-precedence-to-DSCP 35-62
policed-DSCP 35-63
types of 35-12
marked-down actions 35-50, 35-56
marking, described 35-4, 35-8
overview 35-2
packet modification 35-19
policers
configuring 35-50, 35-56, 35-59
described 35-8
displaying 35-79
number of 35-34
types of 35-8
policies, attaching to an interface 35-8
policing
described 35-4, 35-8
token bucket algorithm 35-9
policy maps
characteristics of 35-48
displaying 35-80
hierarchical 35-7
hierarchical on SVIs 35-52
nonhierarchical on physical ports 35-48
QoS label, defined 35-4
queues
configuring egress characteristics 35-71
configuring ingress characteristics 35-67
high priority (expedite) 35-19, 35-78
location of 35-13
SRR, described 35-14
WTD, described 35-13
rewrites 35-19
support for 1-11
trust states
bordering another domain 35-40
described 35-5
trusted device 35-38
within the domain 35-36
quality of service
See QoS
queries, IGMP 24-4
query solicitation, IGMP 24-13
R
RADIUS
attributes
vendor-proprietary 9-31
vendor-specific 9-29
configuring
accounting 9-28
authentication 9-23
authorization 9-27
communication, global 9-21, 9-29
communication, per-server 9-20, 9-21
multiple UDP ports 9-20
default configuration 9-20
defining AAA server groups 9-25
displaying the configuration 9-31
identifying the server 9-20
in clusters 6-15
limiting the services to the user 9-27
method list, defined 9-19
operation of 9-19
overview 9-18
suggested network environments 9-18
support for 1-11
tracking services accessed by user 9-28
range
macro 11-14
of interfaces 11-13
rapid convergence 19-10
rapid per-VLAN spanning-tree plus
See rapid PVST+
rapid PVST+
described 18-10
IEEE 802.1Q trunking interoperability 18-11
instances supported 18-10
Rapid Spanning Tree Protocol
See RSTP
RARP 37-9
rcommand command 6-16
RCP
configuration files
downloading C-17
overview C-15
preparing the server C-16
uploading C-18
image files
deleting old image C-36
downloading C-35
preparing the server C-34
uploading C-36
reachability, tracking IP SLAs IP host 43-9
readiness check
port-based authentication
configuring 10-29
described 10-10, 10-29
reconfirmation interval, VMPS, changing 13-31
reconfirming dynamic VLAN membership 13-31
recovery procedures 48-1
redundancy
EtherChannel 36-3
HSRP 41-1
STP
backbone 18-8
multidrop backbone 20-5
path cost 13-26
port priority 13-24
redundant links and UplinkFast 20-15
reliable transport protocol, EIGRP 37-35
reloading software 3-21
Remote Authentication Dial-In User Service
See RADIUS
Remote Copy Protocol
See RCP
Remote Network Monitoring
See RMON
Remote SPAN
See RSPAN
remote SPAN 29-3
report suppression, IGMP
described 24-6
disabling 24-16, 39-11
resequencing ACL entries 34-15
resets, in BGP 37-50
resetting a UDLD-shutdown interface 28-6
responder, IP SLAs
described 42-4
enabling 42-8
response time, measuring with IP SLAs 42-4
restricted VLAN
configuring 10-41
described 10-14
using with IEEE 802.1x 10-14
restricting access
NTP services 7-8
overview 9-1
passwords and privilege levels 9-2
RADIUS 9-17
TACACS+ 9-10
retry count, VMPS, changing 13-32
reverse address resolution 37-9
Reverse Address Resolution Protocol
See RARP
RFC
1058, RIP 37-19
1112, IP multicast and IGMP 24-2
1157, SNMPv1 32-2
1163, BGP 37-43
1166, IP addresses 37-7
1253, OSPF 37-25
1267, BGP 37-43
1305, NTP 7-2
1587, NSSAs 37-25
1757, RMON 30-2
1771, BGP 37-43
1901, SNMPv2C 32-2
1902 to 1907, SNMPv2 32-2
2236, IP multicast and IGMP 24-2
2273-2275, SNMPv3 32-2
RIP
advertisements 37-20
authentication 37-22
configuring 37-21
default configuration 37-20
described 37-20
for IPv6 38-6
hop counts 37-20
split horizon 37-23
summary addresses 37-23
support for 1-12
RMON
default configuration 30-3
displaying status 30-6
enabling alarms and events 30-3
groups supported 30-2
overview 30-1
statistics
collecting group Ethernet 30-5
collecting group history 30-5
support for 1-14
root guard
described 20-10
enabling 20-18
support for 1-8
root switch
MSTP 19-17
STP 18-16
route calculation timers, OSPF 37-32
route dampening, BGP 37-62
routed packets, ACLs on 34-39
routed ports
configuring 37-5
defined 11-4
in switch clusters 6-8
IP addresses on 11-27, 37-5
route-map command 37-89
route maps
BGP 37-54
policy-based routing 37-87
router ACLs
defined 34-2
types of 34-4
route reflectors, BGP 37-61
router ID, OSPF 37-33
route selection, BGP 37-52
route summarization, OSPF 37-31
route targets, VPN 37-66
routing
default 37-3
dynamic 37-3
redistribution of information 37-83
static 37-3
routing domain confederation, BGP 37-61
Routing Information Protocol
See RIP
routing protocol administrative distances 37-81
RSPAN
and stack changes 29-10
characteristics 29-9
configuration guidelines 29-17
default configuration 29-11
defined 29-3
destination ports 29-8
displaying status 29-25
in a switch stack 29-2
interaction with other features 29-9
monitored ports 29-6
monitoring ports 29-8
overview 1-14, 29-1
received traffic 29-5
session limits 29-11
sessions
creating 29-18
defined 29-4
limiting source traffic to specific VLANs 29-24
specifying monitored ports 29-18
with ingress traffic enabled 29-22
source ports 29-6
transmitted traffic 29-6
VLAN-based 29-7
RSTP
active topology 19-10
BPDU
format 19-12
processing 19-13
designated port, defined 19-9
designated switch, defined 19-9
interoperability with IEEE 802.1D
described 19-9
restarting migration process 19-26
topology changes 19-13
overview 19-9
port roles
described 19-9
synchronized 19-11
proposal-agreement handshake process 19-10
rapid convergence
cross-stack rapid convergence 19-11
described 19-10
edge ports and Port Fast 19-10
point-to-point links 19-10, 19-24
root ports 19-10
root port, defined 19-9
See also MSTP
running configuration
replacing C-19, C-20
rolling back C-19, C-20
running configuration, saving 3-15
S
SC (standby command switch) 6-10
scheduled reloads 3-21
scheduling, IP SLAs operations 42-5
SCP
and SSH 9-48
configuring 9-48
SDM
described 8-1
switch stack consideration 5-9
templates
configuring 8-6
number of 8-1
SDM mismatch mode 5-9, 8-4
SDM template 40-4
aggregator 8-2
configuration guidelines 8-5
configuring 8-5
desktop 8-2
dual IPv4 and IPv6 8-2
types of 8-1
secondary VLANs 16-2
Secure Copy Protocol
secure HTTP client
configuring 9-47
displaying 9-48
secure HTTP server
configuring 9-46
displaying 9-48
secure MAC addresses
and switch stacks 25-18
deleting 25-16
maximum number of 25-10
types of 25-9
secure ports
and switch stacks 25-18
configuring 25-8
secure remote connections 9-37
Secure Shell
See SSH
Secure Socket Layer
See SSL
security, port 25-8
security features 1-9
See SCP
sequence numbers in log messages 31-8
server mode, VTP 14-3
service-provider network, MSTP and RSTP 19-1
service-provider networks
and customer VLANs 17-2
and IEEE 802.1Q tunneling 17-1
Layer 2 protocols across 17-8
Layer 2 protocol tunneling for EtherChannels 17-9
set-request operation 32-5
setup program
failed command switch replacement 48-10
replacing failed command switch 48-9
severity levels, defining in system messages 31-9
SFPs
monitoring status of 11-31, 48-14
numbering of 11-11
security and identification 48-13
status, displaying 48-14
shaped round robin
See SRR
show access-lists hw-summary command 34-22
show and more command output, filtering 2-10
show cdp traffic command 26-5
show cluster members command 6-16
show configuration command 11-25
show forward command 48-21
show interfaces command 11-19, 11-25
show interfaces switchport 21-4
show l2protocol command 17-13, 17-15, 17-16
show lldp traffic command 27-7
show platform forward command 48-21
show running-config command
displaying ACLs 34-20, 34-21, 34-31, 34-34
interface description in 11-25
shutdown command on interfaces 11-32
shutdown threshold for Layer 2 protocol packets 17-11
Simple Network Management Protocol
See SNMP
small form-factor pluggable modules
See SFPs
small-frame arrival rate, configuring 25-5
Smartports macros
applying Cisco-default macros 12-6
applying global parameter values 12-5, 12-6
applying macros 12-5
applying parameter values 12-5, 12-7
configuration guidelines 12-2
creating 12-4
default configuration 12-2
defined 12-1
displaying 12-8
tracing 12-3
SNAP 26-1
SNMP
accessing MIB variables with 32-4
agent
described 32-4
disabling 32-8
and IP SLAs 42-2
authentication level 32-11
community strings
configuring 32-8
for cluster switches 32-4
overview 32-4
configuration examples 32-17
default configuration 32-7
engine ID 32-7
groups 32-7, 32-10
host 32-7
ifIndex values 32-6
in-band management 1-6
in clusters 6-14
informs
and trap keyword 32-12
described 32-5
differences from traps 32-5
disabling 32-16
enabling 32-16
limiting access by TFTP servers 32-16
limiting system log messages to NMS 31-10
manager functions 1-5, 32-3
managing clusters with 6-17
MIBs
location of B-3
supported B-1
notifications 32-5
overview 32-1, 32-4
security levels 32-3
status, displaying 32-18
system contact and location 32-16
trap manager, configuring 32-14
traps
described 32-3, 32-5
differences from informs 32-5
disabling 32-16
enabling 32-12
enabling MAC address notification 7-22
overview 32-1, 32-5
types of 32-12
users 32-7, 32-10
versions supported 32-2
SNMP and Syslog Over IPv6 38-7
SNMPv1 32-2
SNMPv2C 32-2
SNMPv3 32-3
snooping, IGMP 24-2
software compatibility
See stacks, switch
software images
location in flash C-24
recovery procedures 48-2
scheduling reloads 3-21
tar file format, described C-24
See also downloading and uploading
source addresses
in IPv4 ACLs 34-12
in IPv6 ACLs 40-5
source-and-destination-IP address based forwarding, EtherChannel 36-9
source-and-destination MAC address forwarding, EtherChannel 36-9
source-IP address based forwarding, EtherChannel 36-9
source-MAC address forwarding, EtherChannel 36-8
Source-specific multicast
See SSM
SPAN
and stack changes 29-10
configuration guidelines 29-11
default configuration 29-11
destination ports 29-8
displaying status 29-25
interaction with other features 29-9
monitored ports 29-6
monitoring ports 29-8
overview 1-14, 29-1
ports, restrictions 25-12
received traffic 29-5
session limits 29-11
sessions
configuring ingress forwarding 29-16, 29-23
creating 29-12
defined 29-4
limiting source traffic to specific VLANs 29-16
removing destination (monitoring) ports 29-14
specifying monitored ports 29-12
with ingress traffic enabled 29-15
source ports 29-6
transmitted traffic 29-6
VLAN-based 29-7
spanning tree and native VLANs 13-19
Spanning Tree Protocol
See STP
SPAN traffic 29-5
split horizon, RIP 37-23
SRR
configuring
shaped weights on egress queues 35-75
shared weights on egress queues 35-77
shared weights on ingress queues 35-69
described 35-14
shaped mode 35-14
shared mode 35-14
support for 1-12
SSH
configuring 9-39
cryptographic software image 9-37
described 1-6, 9-37
encryption methods 9-38
switch stack considerations 5-16, 9-38
user authentication methods, supported 9-38
SSL
configuration guidelines 9-45
configuring a secure HTTP client 9-47
configuring a secure HTTP server 9-46
cryptographic software image 9-42
described 9-41
monitoring 9-48
SSM
address management restrictions 45-16
CGMP limitations 45-16
components 45-14
configuration guidelines 45-15
configuring 45-14, 45-16
differs from Internet standard multicast 45-14
IGMP snooping 45-16
IGMPv3 45-14
IGMPv3 Host Signalling 45-15
IP address range 45-15
monitoring 45-16
operations 45-15
PIM 45-14
state maintenance limitations 45-16
SSM mapping 45-17
configuration guidelines 45-17
configuring 45-17, 45-19
DNS-based 45-18, 45-20
monitoring 45-22
overview 45-18
restrictions 45-18
static 45-18, 45-20
static traffic forwarding 45-21
stack, switch
MAC address of 5-19
stack changes
effects on
IPv6 routing 38-9
stack changes, effects on
802.1x port-based authentication 10-7
ACL configuration 34-7
CDP 26-2
cross-stack EtherChannel 36-13
EtherChannel 36-10
fallback bridging 47-3
HSRP 41-5
IGMP snooping 24-6
IP routing 37-4
IPv6 ACLs 40-3
MAC address tables 7-21
MSTP 19-8
multicast routing 45-10
MVR 24-18
port security 25-18
SDM template selection 8-4
SNMP 32-1
SPAN and RSPAN 29-10
STP 18-12
switch clusters 6-14
system message log 31-2
VLANs 13-6
VTP 14-6
stack master
bridge ID (MAC address) 5-5
defined 5-1
election 5-4
IPv6 38-9
re-election 5-4
See also stacks, switch
stack member
accessing CLI of specific member 5-23
configuring
member number 5-21
priority value 5-21
defined 5-1
displaying information of 5-23
IPv6 38-10
number 5-6
priority value 5-6
provisioning a new member 5-22
replacing 5-15
See also stacks, switch
stack member number 11-11
stack protocol version 5-10
stacks, switch
accessing CLI of specific member 5-23
assigning information
member number 5-21
priority value 5-21
provisioning a new member 5-22
auto-advise 5-11
auto-copy 5-11
auto-extract 5-11
auto-upgrade 5-11
benefits 1-2
bridge ID 5-5
CDP considerations 26-2
compatibility, software 5-10
configuration file 5-14
configuration scenarios 5-17
copying an image file from one member to another C-37
default configuration 5-19
description of 5-1
displaying information of 5-23
enabling persistent MAC address timer 5-19
hardware compatibility and SDM mismatch mode 5-9
HSRP considerations 41-5
in clusters 6-14
incompatible software and image upgrades 5-14, C-37
IPv6 on 38-9
MAC address considerations 7-21
management connectivity 5-15
managing 5-1
membership 5-3
merged 5-3
MSTP instances supported 18-10
multicast routing, stack master and member roles 45-9
offline configuration
described 5-7
effects of adding a provisioned switch 5-7
effects of removing a provisioned switch 5-9
effects of replacing a provisioned switch 5-9
provisioned configuration, defined 5-7
provisioned switch, defined 5-7
provisioning a new member 5-22
partitioned 5-3, 48-8
provisioned switch
adding 5-7
removing 5-9
replacing 5-9
replacing a failed member 5-15
software compatibility 5-10
software image version 5-10
stack protocol version 5-10
STP
bridge ID 18-3
instances supported 18-10
root port selection 18-3
stack root switch election 18-3
system messages
hostnames in the display 31-1
remotely monitoring 31-2
system prompt consideration 7-14
system-wide configuration considerations 5-15
upgrading C-37
version-mismatch (VM) mode
automatic upgrades with auto-upgrade 5-11
described 5-10
examples 5-12
manual upgrades with auto-advise 5-11
upgrades with auto-extract 5-11
See also stack master and stack member
StackWise technology, Cisco 1-3
See also stacks, switch
standby command switch
configuring
considerations 6-11
defined 6-2
priority 6-10
requirements 6-3
virtual IP address 6-11
See also cluster standby group and HSRP
standby group, cluster
See cluster standby group and HSRP
standby ip command 41-6
standby links 21-2
standby router 41-1
standby timers, HSRP 41-11
startup configuration
booting
manually 3-18
specific image 3-19
clearing C-19
configuration file
automatically downloading 3-17
specifying the filename 3-17
default boot configuration 3-17
static access ports
assigning to VLAN 13-11
defined 11-3, 13-3
static addresses
See addresses
static IP routing 1-12
static MAC addressing 1-9
static route primary interface,configuring 43-10
static routes
configuring 37-81
configuring for IPv6 38-19
understanding 38-6
static routing 37-3
static routing support, enhanced object tracking 43-10
static SSM mapping 45-18, 45-20
static traffic forwarding 45-21
static VLAN membership 13-2
statistics
802.1x 10-52
CDP 26-5
interface 11-30
IP multicast routing 45-62
LLDP 27-7
LLDP-MED 27-7
OSPF 37-34
QoS ingress and egress 35-79
RMON group Ethernet 30-5
RMON group history 30-5
SNMP input and output 32-18
VTP 14-16
sticky learning 25-9
storm control
configuring 25-3
described 25-1
disabling 25-5
displaying 25-19
support for 1-4
thresholds 25-1
STP
accelerating root port selection 20-4
BackboneFast
described 20-7
disabling 20-17
enabling 20-16
BPDU filtering
described 20-3
disabling 20-15
enabling 20-14
BPDU guard
described 20-2
disabling 20-14
enabling 20-13
BPDU message exchange 18-3
configuration guidelines 18-13, 20-12
configuring
forward-delay time 18-23
hello time 18-22
maximum aging time 18-23
path cost 18-20
port priority 18-18
root switch 18-16
secondary root switch 18-18
spanning-tree mode 18-15
switch priority 18-21
transmit hold-count 18-24
counters, clearing 18-24
cross-stack UplinkFast
described 20-5
enabling 20-16
default configuration 18-13
default optional feature configuration 20-12
designated port, defined 18-4
designated switch, defined 18-4
detecting indirect link failures 20-8
disabling 18-16
displaying status 18-24
EtherChannel guard
described 20-10
disabling 20-17
enabling 20-17
extended system ID
effects on root switch 18-16
effects on the secondary root switch 18-18
overview 18-4
unexpected behavior 18-16
features supported 1-7
IEEE 802.1D and bridge ID 18-4
IEEE 802.1D and multicast addresses 18-9
IEEE 802.1t and VLAN identifier 18-5
inferior BPDU 18-3
instances supported 18-10
interface state, blocking to forwarding 20-2
interface states
blocking 18-6
disabled 18-7
forwarding 18-6, 18-7
learning 18-7
listening 18-7
overview 18-5
interoperability and compatibility among modes 18-11
keepalive messages 18-2
Layer 2 protocol tunneling 17-7
limitations with IEEE 802.1Q trunks 18-11
load sharing
overview 13-24
using path costs 13-26
using port priorities 13-24
loop guard
described 20-11
enabling 20-18
modes supported 18-10
multicast addresses, effect of 18-9
optional features supported 1-8
overview 18-2
path costs 13-26, 13-27
Port Fast
described 20-2
enabling 20-12
port priorities 13-25
preventing root switch selection 20-10
protocols supported 18-10
redundant connectivity 18-8
root guard
described 20-10
enabling 20-18
root port, defined 18-3
root port selection on a switch stack 18-3
root switch
configuring 18-16
effects of extended system ID 18-4, 18-16
election 18-3
unexpected behavior 18-16
shutdown Port Fast-enabled port 20-2
stack changes, effects of 18-12
status, displaying 18-24
superior BPDU 18-3
timers, described 18-22
UplinkFast
described 20-3
enabling 20-15
VLAN-bridge 18-11
stratum, NTP 7-2
stub areas, OSPF 37-30
stub routing, EIGRP 37-41
subdomains, private VLAN 16-1
subnet mask 37-7
subnet zero 37-7
success response, VMPS 13-28
summer time 7-13
SunNet Manager 1-5
supernet 37-8
supported watts per port 11-7
SVI autostate exclude
configuring 11-28
defined 11-6
SVI link state 11-6
SVIs
and IP unicast routing 37-5
and router ACLs 34-4
connecting VLANs 11-10
defined 11-5
routing between VLANs 13-2
switch 38-2
switch clustering technology 6-1
See also clusters, switch
switch console port 1-7
Switch Database Management
See SDM
switched packets, ACLs on 34-38
Switched Port Analyzer
See SPAN
switched ports 11-2
switchport backup interface 21-4, 21-5
switchport block multicast command 25-8
switchport block unicast command 25-8
switchport command 11-16
switchport mode dot1q-tunnel command 17-6
switchport protected command 25-7
switch priority
MSTP 19-22
STP 18-21
switch software features 1-1
switch stacks
Catalyst 3750G wireless LAN controller switch A-2
switch virtual interface
See SVI
synchronization, BGP 37-48
syslog
See system message logging
system capabilities TLV 27-2
system clock
configuring
daylight saving time 7-13
manually 7-11
summer time 7-13
time zones 7-12
displaying the time and date 7-12
overview 7-1
See also NTP
system description TLV 27-2
system message logging
default configuration 31-4
defining error message severity levels 31-9
disabling 31-4
displaying the configuration 31-14
enabling 31-5
facility keywords, described 31-14
level keywords, described 31-10
limiting messages 31-10
message format 31-2
overview 31-1
sequence numbers, enabling and disabling 31-8
setting the display destination device 31-5
stack changes, effects of 31-2
synchronizing log messages 31-6
syslog facility 1-14
time stamps, enabling and disabling 31-8
UNIX syslog servers
configuring the daemon 31-12
configuring the logging facility 31-13
facilities supported 31-14
system MTU and IEEE 802.1Q tunneling 17-5
system name
default configuration 7-15
default setting 7-15
manual configuration 7-15
See also DNS
system name TLV 27-2
system prompt, default setting 7-14, 7-15
system resources, optimizing 8-1
T
TACACS+
accounting, defined 9-11
authentication, defined 9-11
authorization, defined 9-11
configuring
accounting 9-17
authentication key 9-13
authorization 9-16
login authentication 9-14
default configuration 9-13
displaying the configuration 9-17
identifying the server 9-13
in clusters 6-15
limiting the services to the user 9-16
operation of 9-12
overview 9-10
support for 1-11
tracking services accessed by user 9-17
tagged packets
IEEE 802.1Q 17-3
Layer 2 protocol 17-7
tar files
creating C-6
displaying the contents of C-7
extracting C-7
image file format C-24
TCL script, registering and defining with embedded event manager 33-6
TDR 1-14
Telnet
accessing management interfaces 2-11
number of connections 1-6
setting a password 9-6
templates, SDM 8-2
temporary self-signed certificate 9-43
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password 9-6
TFTP
configuration files
downloading C-11
preparing the server C-10
uploading C-12
configuration files in base directory 3-7
configuring for autoconfiguration 3-7
image files
deleting C-27
downloading C-26
preparing the server C-25
uploading C-28
limiting access by servers 32-16
TFTP server 1-5
threshold, traffic level 25-2
threshold monitoring, IP SLAs 42-6
time
See NTP and system clock
Time Domain Reflector
See TDR
time-range command 34-17
time ranges in ACLs 34-17
time stamps in log messages 31-8
time zones 7-12
TLVs
defined 27-2
LLDP 27-2
LLDP-MED 27-2
Token Ring VLANs
support for 13-6
VTP support 14-4
ToS 1-11
traceroute, Layer 2
and ARP 48-16
and CDP 48-16
broadcast traffic 48-16
described 48-16
IP addresses and subnets 48-16
MAC addresses and VLANs 48-16
multicast traffic 48-16
multiple devices on a port 48-17
unicast traffic 48-16
usage guidelines 48-16
traceroute command 48-18
See also IP traceroute
tracked lists
configuring 43-3
types 43-3
tracked objects
by Boolean expression 43-4
by threshold percentage 43-6
by threshold weight 43-5
tracking interface line-protocol state 43-2
tracking IP routing state 43-2
tracking objects 43-1
tracking process 43-1
track state, tracking IP SLAs 43-9
traffic
blocking flooded 25-8
fragmented 34-5
fragmented IPv6 40-2
unfragmented 34-5
traffic policing 1-11
traffic suppression 25-1
transmit hold-count
see STP
transparent mode, VTP 14-3, 14-12
trap-door mechanism 3-2
traps
configuring MAC address notification 7-22
configuring managers 32-12
defined 32-3
enabling 7-22, 32-12
notification types 32-12
overview 32-1, 32-5
troubleshooting
connectivity problems 48-14, 48-15, 48-17
detecting unidirectional links 28-1
displaying crash information 48-24
PIMv1 and PIMv2 interoperability problems 45-35
setting packet forwarding 48-21
SFP security and identification 48-13
show forward command 48-21
with CiscoWorks 32-4
with debug commands 48-20
with ping 48-14
with system message logging 31-1
with traceroute 48-17
trunk failover
See link-state tracking
trunking encapsulation 1-8
trunk ports
configuring 13-20
defined 11-3, 13-3
encapsulation 13-20, 13-25, 13-27
trunks
allowed-VLAN list 13-21
configuring 13-20, 13-25, 13-27
ISL 13-16
load sharing
setting STP path costs 13-26
using STP port priorities 13-24, 13-25
native VLAN for untagged traffic 13-23
parallel 13-26
pruning-eligible list 13-22
to non-DTP device 13-17
trusted boundary for QoS 35-38
trusted port states
between QoS domains 35-40
classification options 35-5
ensuring port security for IP phones 35-38
support for 1-11
within a QoS domain 35-36
trustpoints, CA 9-42
tunneling
defined 17-1
IEEE 802.1Q 17-1
Layer 2 protocol 17-8
tunnel ports
defined 13-4
described 11-4, 17-1
IEEE 802.1Q, configuring 17-6
incompatibilities with other features 17-6
twisted-pair Ethernet, detecting unidirectional links 28-1
type of service
See ToS
U
UDLD
configuration guidelines 28-4
default configuration 28-4
disabling
globally 28-5
on fiber-optic interfaces 28-5
per interface 28-6
echoing detection mechanism 28-3
enabling
globally 28-5
per interface 28-6
Layer 2 protocol tunneling 17-10
link-detection mechanism 28-1
neighbor database 28-2
overview 28-1
resetting an interface 28-6
status, displaying 28-7
support for 1-7
UDP, configuring 37-15
UDP jitter, configuring 42-9
UDP jitter operation, IP SLAs 42-8
unauthorized ports with IEEE 802.1x 10-7
unicast MAC address filtering 1-6
and adding static addresses 7-25
and broadcast MAC addresses 7-25
and CPU packets 7-25
and multicast addresses 7-25
and router MAC addresses 7-25
configuration guidelines 7-25
described 7-25
unicast storm 25-1
unicast storm control command 25-4
unicast traffic, blocking 25-8
UniDirectional Link Detection protocol
See UDLD
UNIX syslog servers
daemon configuration 31-12
facilities supported 31-14
message logging configuration 31-13
unrecognized Type-Length-Value (TLV) support 14-4
upgrading software images
See downloading
UplinkFast
described 20-3
disabling 20-16
enabling 20-15
support for 1-7
uploading
configuration files
preparing C-10, C-13, C-16
reasons for C-9
using FTP C-14
using RCP C-18
using TFTP C-12
image files
preparing C-25, C-29, C-34
reasons for C-23
using FTP C-32
using RCP C-36
using TFTP C-28
User Datagram Protocol
See UDP
user EXEC mode 2-2
username-based authentication 9-6
V
version-dependent transparent mode 14-4
version-mismatch (VM) mode
automatic upgrades with auto-upgrade 5-11
described 5-10
displaying 5-11
manual upgrades with auto-advise 5-11
upgrades with auto-extract 5-11
virtual IP address
cluster standby group 6-11
command switch 6-11
Virtual Private Network
See VPN
virtual router 41-1, 41-2
virtual switches and PAgP 36-6
vlan.dat file 13-5
VLAN 1, disabling on a trunk port 13-22
VLAN 1 minimization 13-21
VLAN ACLs
See VLAN maps
vlan-assignment response, VMPS 13-28
VLAN configuration
at bootup 13-8
saving 13-8
VLAN configuration mode 2-2, 13-7
VLAN database
and startup configuration file 13-8
and VTP 14-1, 33-1
VLAN configuration saved in 13-7
VLANs saved in 13-4
vlan database command 13-7
vlan dot1q tag native command 17-5
VLAN filtering and SPAN 29-7
vlan global configuration command 13-7
VLAN ID, discovering 7-27
VLAN link state 11-5
VLAN load balancing on flex links 21-2
configuration guidelines 21-8
VLAN management domain 14-2
VLAN Management Policy Server
See VMPS
VLAN map entries, order of 34-30
VLAN maps
applying 34-34
common uses for 34-34
configuration guidelines 34-30
configuring 34-29
creating 34-31
defined 34-2
denying access to a server example 34-35
denying and permitting packets 34-31
displaying 34-41
examples of ACLs and VLAN maps 34-32
removing 34-34
support for 1-9
wiring closet configuration example 34-35
VLAN membership
confirming 13-31
modes 13-3
VLAN Query Protocol
See VQP
VLANs
adding 13-9
adding to VLAN database 13-9
aging dynamic addresses 18-9
allowed on trunk 13-21
and spanning-tree instances 13-3, 13-6, 13-13
configuration guidelines, extended-range VLANs 13-13
configuration guidelines, normal-range VLANs 13-6
configuration options 13-7
configuring 13-1
configuring IDs 1006 to 4094 13-13
connecting through SVIs 11-10
creating in config-vlan mode 13-9
creating in VLAN configuration mode 13-10
customer numbering in service-provider networks 17-3
default configuration 13-8
deleting 13-10
described 11-2, 13-1
displaying 13-16
extended-range 13-1, 13-12
features 1-8
illustrated 13-2
internal 13-13
in the switch stack 13-6
limiting source traffic with RSPAN 29-24
limiting source traffic with SPAN 29-16
modifying 13-9
multicast 24-17
native, configuring 13-23
normal-range 13-1, 13-4
number supported 1-8
parameters 13-5
port membership modes 13-3
static-access ports 13-11
STP and IEEE 802.1Q trunks 18-11
supported 13-2
Token Ring 13-6
traffic between 13-2
VLAN-bridge STP 18-11, 47-2
VTP modes 14-3
VLAN Trunking Protocol
See VTP
VLAN trunks 13-16
VMPS
administering 13-32
configuration example 13-33
configuration guidelines 13-29
default configuration 13-29
description 13-27
dynamic port membership
described 13-28
reconfirming 13-31
troubleshooting 13-33
entering server address 13-30
mapping MAC addresses to VLANs 13-28
monitoring 13-32
reconfirmation interval, changing 13-31
reconfirming membership 13-31
retry count, changing 13-32
voice aware 802.1x security
port-based authentication
configuring 10-30
described 10-21, 10-30
voice-over-IP 15-1
voice VLAN
Cisco 7960 phone, port connections 15-1
configuration guidelines 15-3
configuring IP phones for data traffic
override CoS of incoming frame 15-6
trust CoS priority of incoming frame 15-6
configuring ports for voice traffic in
802.1p priority tagged frames 15-5
802.1Q frames 15-5
connecting to an IP phone 15-4
default configuration 15-3
described 15-1
displaying 15-7
IP phone data traffic, described 15-2
IP phone voice traffic, described 15-2
VPN
configuring routing in 37-73
forwarding 37-66
in service provider networks 37-64
routes 37-65
VPN routing and forwarding table
See VRF
VQP 1-8, 13-27
VRF
defining 37-66
tables 37-64
VRF-aware services
ARP 37-70
configuring 37-70
ftp 37-72
HSRP 37-71
ping 37-70
SNMP 37-71
syslog 37-72
tftp 37-72
traceroute 37-72
uRPF 37-71
VTP
adding a client to a domain 14-14
advertisements 13-19, 14-3
and extended-range VLANs 14-2
and normal-range VLANs 14-2
client mode, configuring 14-11
configuration
global configuration mode 14-7
guidelines 14-8
privileged EXEC mode 14-7
requirements 14-9
saving 14-7
VLAN configuration mode 14-8
configuration mode options 14-7
configuration requirements 14-9
configuration revision number
guideline 14-14
resetting 14-15
configuring
client mode 14-11
server mode 14-9
transparent mode 14-12
consistency checks 14-4
default configuration 14-7
described 14-1
disabling 14-12
domain names 14-8
domains 14-2
Layer 2 protocol tunneling 17-8
modes
client 14-3, 14-11
server 14-3, 14-9
transitions 14-3
transparent 14-3, 14-12
monitoring 14-16
passwords 14-8
pruning
disabling 14-14
enabling 14-14
examples 14-5
overview 14-4
support for 1-8
pruning-eligible list, changing 13-22
server mode, configuring 14-9
statistics 14-16
support for 1-8
Token Ring support 14-4
transparent mode, configuring 14-12
using 14-1
version, guidelines 14-9
Version 1 14-4
Version 2
configuration guidelines 14-9
disabling 14-13
enabling 14-13
overview 14-4
W
WCCP
authentication 44-3
configuration guidelines 44-5
default configuration 44-5
described 44-1
displaying 44-9
dynamic service groups 44-3
enabling 44-6
features unsupported 44-5
forwarding method 44-3
Layer-2 header rewrite 44-3
MD5 security 44-3
message exchange 44-2
monitoring and maintaining 44-9
negotiation 44-3
packet redirection 44-3
packet-return method 44-3
redirecting traffic received from a client 44-6
setting the password 44-7
unsupported WCCPv2 features 44-5
web authentication 10-10
configuring10-47to10-50, 10-50to ??
described 1-9, 10-21
fallback for IEEE 802.1x 10-49
Web Cache Communication Protocol
See WCCP
weighted tail drop
See WTD
weight thresholds in tracked lists 43-5
wireless access point, Cisco AP1250 11-7
wireless LAN controller A-1, A-3
wizards 1-3
WTD
described 35-13
setting thresholds
egress queue-sets 35-72
ingress queues 35-67
support for 1-12
X
Xmodem protocol 48-2