Symbols -
Numerics -
A -
B -
C -
D -
E -
F -
G -
H -
I -
J -
K -
L -
M -
N -
O -
P -
Q -
R -
S -
T -
U -
V -
Index
Symbols
28-12
Numerics
802.10 SAID (default)7-4
802.1Q
trunks11-6
tunneling
compatibility with other features16-5
defaults16-4
described16-2
tunnel ports with other features16-6
802.1Q VLANs
encapsulation9-3
trunk restrictions9-5
802.1s
See MST
802.1w
See MST
802.1X
See port-based authentication
802.1X authentication
RADIUS accounting28-7
support for guest VLANs28-6
using with port security28-6
802.3ad
See LACP
A
AAA
enabling28-12
abbreviating commands2-5
access control entries
See ACEs
access list filtering, SPAN enhancement37-13
access ports
and Layer 2 protocol tunneling16-9
configuring9-8
access VLANs9-6
accounting
configuring for 802.1X28-15
ACEs
ACLs32-2
Ethernet32-2
IP32-2
Layer 4 operation restrictions32-8
ACLs
ACEs32-2
and SPAN37-5
and TCAM programming32-6
applying on routed packets32-21
applying on switched packets32-20
compatibility on the same switch32-3
configuring with VLAN maps32-20
CPU impact32-9
hardware and software support32-5
IP, matching criteria for port ACLs32-4
MAC extended32-11
matching criteria for router ACLs32-3
port
and voice VLAN32-4
defined32-2
limitations32-4
processing32-9
types supported32-2
acronyms, list ofA-1
active queue management26-13
addresses
See MAC addresses
adjacency tables
description21-2
displaying statistics21-9
advertisements, VTP
See VTP advertisements
alarms
major36-2
minor36-2
asymmetrical links, and 802.1Q tunneling16-4
audiencexxi
authentication
See also port-based authentication
authentication server
defined28-3
RADIUS server28-3
authorized and unauthorized ports28-4
authorized ports with 802.1X28-4
autoconfiguration3-2
automatic QoS
See QoS
Auto-QoS
configuring26-15
B
BackboneFast
adding a switch (figure)12-2
and MST13-2
configuring12-15
link failure (figure)12-7, 12-8
not supported MST13-2
understanding12-6
See also STP
BGP1-8
routing session with multi-VRF CE25-6
blocking packets34-1
blocking state (STP)
RSTP comparisons (table)13-4
boot bootldr command3-24
boot command3-21
boot fields
See configuration register boot fields
boot system command3-19, 3-24
boot system flash command3-21
Border Gateway Protocol
See BGP
boundary ports
description13-6
BPDU Guard
and MST13-2
configuring12-12
overview12-4
BPDUs
and media speed11-2
pseudobridges and13-5
what they contain11-3
bridge ID
See STP bridge ID
bridge priority (STP)11-16
bridge protocol data units
See BPDUs
broadcast storm control
disabling35-4
BSR
configuration example22-21
burst rate26-39
burst size26-26
C
cautions for passwords
encrypting3-16
TACACS+3-15
CDP
and trusted boundary26-24
configuration17-2
displaying configuration17-3
enabling on interfaces17-3
Layer 2 protocol tunneling16-7
maintaining17-3
monitoring17-3
overview1-2, 17-1
cdp enable command17-3
CEF
adjacency tables21-2
configuring load balancing21-7
displaying statistics21-8
enabling21-6
hardware switching21-4
load balancing21-6
overview21-1
software switching21-4
CGMP
overview15-1
channel-group group command14-7, 14-10
Cisco Discovery Protocol
See CDP
Cisco Express Forwarding
See CEF
Cisco Group Management Protocol
See CGMP
Cisco IP Phones
configuring27-2
Cisco IP phones
sound quality27-1
CiscoView1-12
CIST
description13-2
class-map command26-27
class of service
See CoS
clear cdp counters command17-4
clear cdp table command17-3
clear counters command4-13
clearing
IP multicast table entries22-20
clear ip flow stats command38-6
CLI
accessing2-1
backing out one level2-5
getting commands2-5
history substitution2-3
modes2-5
monitoring environments37-1
ROM monitor2-6
software basics2-4
clients
in 802.1X authentication28-2
command-line processing2-3
command modes2-5
commands
listing2-5
command switches
in VMPS8-1
common and internal spanning tree
See CIST
common spanning tree
See CST
community ports
description33-1
community VLANs
and SPAN features33-4
configure as a PVLAN33-5
description33-1
config-register command3-22
config terminal command3-9
configuration files
obtaining with DHCP3-6
saving3-10
configuration guidelines
for VMPS8-3
configuration register
boot fields
listing value3-22
modifying3-21
changing settings3-22
configuring3-19
settings at startup3-21
configure terminal command3-22, 4-2
console configuration mode2-5
console port
disconnecting user sessions5-5
monitoring user sessions5-4
copy running-config startup-config command3-10
copy system:running-config nvram:startup-config command3-24
CoS
configuring port value26-36
definition26-3
figure26-2
overriding on Cisco IP Phones27-3
priority27-3
CoS-to-DSCP maps26-40
counters
clearing MFIB22-20
clearing on interfaces4-13
CPU port sniffing37-10
CST
description13-5
IST and13-2
MST and13-2
customer edge devices25-2
D
default configuration
802.1X28-11
auto-QoS26-15
IGMP filtering15-17
Layer 2 protocol tunneling16-9
multi-VRF CE25-3
SPAN and RSPAN37-6
default gateway
configuring3-11
verifying configuration3-11
default ports
and support for 802.1X authentication28-12
description command4-9
detecting unidirectional links18-1
DHCP-based autoconfiguration
client request message exchange3-3
configuring
client side3-2
DNS3-5
relay device3-5
server-side3-3
TFTP server3-4
example3-7
lease options
for IP address information3-4
for receiving the configuration file3-4
overview3-2
relationship to BOOTP3-2
DHCP snooping
configuring30-3
default configuration30-3
displaying binding tables30-10
displaying configuration30-10
enabling30-4
enabling on private VLAN30-5
enabling the database agent30-6
monitoring30-9, 30-13, 30-14
overview30-1
Snooping database agent30-2
DHCP Snooping Database Agent
adding to the database (example)30-9
enabling (example)30-6
overview30-2
reading from a TFTP file (example)30-8
Differentiated Services Code Point values
See DSCP values
DiffServ architecture, QoS26-2
disabled state
RSTP comparisons (table)13-4
disabling
broadcast storm control35-4
disconnect command5-5
DNS
and DHCP-based autoconfiguration3-5
documentation
organizationxxi
relatedxxiii
double-tagged packets
802.1Q tunneling16-2
Layer 2 protocol tunneling16-9
drop threshold for Layer 2 protocol packets16-9
DSCP maps26-40
DSCP-to-CoS maps
configuring26-42
DSCP values
configuring maps26-40
configuring port value26-37
definition26-3
IP precedence26-2
mapping markdown26-22
mapping to transmit queues26-38
DTP
VLAN trunks and9-3
duplex command4-8
duplex mode
configuring interface4-7
Dynamic Host Configuration Protocol snooping
See DHCP snooping
dynamic ports
limit on hosts8-8
dynamic port VLAN membership
configuring8-5
overview8-2
reconfirming8-7
troubleshooting8-8
Dynamic Trunking Protocol
See DTP
E
EAP
request/identity frame28-3
response/identity frame28-3
EAP frames
changing retransmission time28-18
exchanging (figure)28-4
setting retransmission number28-19
EAPOL frame
start28-3
EAPOL frames
802.1X authentication and28-2
OTP authentication, example (figure)28-4
edge ports
description13-7
EGP
overview1-8
EIGRP
overview1-8
Embedded CiscoView1-12
enable command3-9, 3-22
enable mode2-5
encapsulation types9-3
Enhanced Interior Gateway Routing Protocol
See EIGRP
environmental monitoring
LED indications36-2
SNMP traps36-2
supervisor engine36-2
switching modules36-2
using CLI commands36-1
EtherChannel
channel-group group command14-7, 14-10
configuration guidelines14-5
configuring14-6to 14-14
configuring Layer 214-9
configuring Layer 314-6
interface port-channel command14-7
lacp system-priority
command example14-12
modes14-3
overview14-1
PAgP
Understanding14-3
physical interface configuration14-7
port-channel interfaces14-2
port-channel load-balance command14-12
removing14-14
removing interfaces14-13
EtherChannel ports
802.1x authentication not supported in28-12
explicit host tracking
enabling15-8
extended range VLANs
See VLANs
Extensible Authentication Protocol over LAN28-2
Exterior Gateway Protocol
See EGP
F
FastDrop
clearing entries22-20
displaying entries22-19
overview22-10
FIB
description21-2
See also MFIB
filtering
in a VLAN32-12
non-IP traffic32-11
flags22-11
Flash memory
configuring router to boot from3-24
loading system images from3-23
security precautions3-24
flooded traffic, blocking34-2
forward-delay time (STP)
configuring11-18
forwarding information base
See FIB
G
gateway
See default gateway
global configuration mode2-5
Guest-VLANs
configure with 802.1X28-16
H
hardware and software ACL support32-5
hardware switching21-5
hello time (STP)
configuring11-17
history
CLI2-3
hop counts
configuring MST bridges13-7
host
configuring host statically15-8
limit on dynamic port8-8
Hot Standby Routing Protocol
See HSRP
HSRP
description1-6
hw-module module num power command36-21
I
ICMP
enabling5-10
ping5-5
running IP traceroute5-7
time exceeded messages5-7
IDS
using with SPAN and RSPAN37-2
IEEE 802.1s
See MST
IEEE 802.1w
See MST
IEEE 802.3ad
See LACP
IGMP
description22-3
enabling22-13
explicit host tracking15-3, 15-8
immediate-leave processing15-3
overview15-1
IGMP filtering
configuring15-17
default configuration15-17
described15-16
monitoring15-20
IGMP groups
setting the maximum number15-19
IGMP profile
applying15-18
configuration mode15-17
configuring15-17
IGMP snooping
configuration guidelines15-4
enabling15-5
IP multicast and22-4
monitoring15-11
overview15-1
IGRP
description1-7
immediate-leave processing
enabling15-7
IGMP
See fast-leave processing
ingress packets, SPAN enhancement37-12
inline power
configuring on Cisco IP phones27-4
See PoE
Intelligent Power Management36-20
interface command3-9, 4-1
interface port-channel command14-7
interface range command4-4
interface range macro command4-5
interfaces
adding descriptive name4-9
clearing counters4-13
configuring4-2
configuring ranges4-4
displaying information about4-13
Layer 2 modes9-4
maintaining4-13
monitoring4-13
naming4-9
numbers4-2
overview4-1
restarting4-14
See also Layer 2 interfaces
Interior Gateway Routing Protocol
See IGRP
Internet Control Message Protocol
See ICMP
Internet Group Management Protocol
See IGMP
Inter-Switch Link encapsulation
See ISL encapsulation
Intrusion Detection System
See IDS
IP
configuring default gateway3-11
configuring static routes3-11
displaying statistics21-8
flow switching cache38-6
ip cef command21-6
ip flow-aggregation cache destination-prefix command38-8
ip flow-aggregation cache prefix command38-8
ip flow-aggregation cache source-prefix command38-8
ip flow-export command38-6
ip icmp rate-limit unreachable command5-11
ip igmp profile command15-17
ip igmp snooping tcn flood command15-10
ip igmp snooping tcn flood query count command15-10
ip igmp snooping tcn query solicit command15-11
IP information
assigned
through DHCP-based autoconfiguration3-2
ip load-sharing per-destination command21-7
ip local policy route-map command23-5
ip mask-reply command5-12
IP multicast
clearing table entries22-20
configuring22-12
default configuration22-13
displaying PIM information22-15
displaying the routing table information22-16
enabling22-13
enabling dense-mode PIM22-14
enabling sparse-mode22-14
features not supported22-12
hardware forwarding22-8
IGMP snooping and15-4, 22-4
monitoring22-15
overview22-1
routing protocols22-2
software forwarding22-8
See also Auto-RP; IGMP; PIM; RP; RPF
ip multicast-routing command22-13
IP phones
automatic classification and queueing26-15
configuring voice ports27-2
See Cisco IP Phones27-1
trusted boundary for QoS26-24
ip pim command22-14
ip pim dense-mode command22-14
ip pim sparse-dense-mode command22-15
ip policy route-map command23-4
ip redirects command5-11
ip route-cache flow command38-5
IP routing tables
deleting entries22-20
IP Source Guard
configuring30-11
configuring on private VLANs30-12
displaying30-13, 30-14
overview30-10
IP statistics
displaying21-8
IP traceroute
executing5-7
overview5-7
IP unicast
displaying statistics21-8
ip unreachables command5-10
IPX
redistribution of route information with EIGRP1-8
ISL
encapsulation9-3
trunking with 802.1Q tunneling16-4
isolated ports
description33-1
isolated VLANs
description33-1
IST
description13-2
MST regions and13-2
IST master
description13-7
J
jumbo frames
and ethernet ports4-10
configuring MTU sizes for4-11
ports and linecards that support4-10
VLAN interfaces4-11
K
keyboard shortcuts2-3
L
l2protocol-tunnel command16-11
labels
definition26-3
LACP
system ID14-4
Layer 2 access ports9-8
Layer 2 frames
classification with CoS26-2
Layer 2 interfaces
assigning VLANs7-8
configuring9-5
configuring as PVLAN host ports33-8
configuring as PVLAN promiscuous ports33-7
configuring as PVLAN trunk ports33-9
defaults9-5
disabling configuration9-9
modes9-4
show interfaces command9-7
Layer 2 interface type
resetting33-11
setting33-11
Layer 2 protocol tunneling
configuring16-9
default configuration16-9
defined16-7
guidelines16-10
Layer 2 switching
overview9-1
Layer 2 Traceroute
and ARP5-9
and CDP5-8
described5-8
host-to-host paths5-8
IP addresses and subnets5-9
MAC addresses and VLANs5-9
multicast traffic5-9
multiple devices on a port5-9
unicast traffic1-3, 5-8
usage guidelines5-8
Layer 2 trunks
configuring9-6
overview9-3
Layer 3 packets
classification methods26-2
Layer 4 port operations
configuration guidelines32-8
restrictions32-8
LEDs
description (table)36-2
listening state (STP)
RSTP comparisons (table)13-4
load balancing
configuring for CEF21-7
configuring for EtherChannel14-12
overview14-5, 21-6
per-destination21-7
login timer
changing5-4
logoutwarning command5-4
loop guard
and MST13-2
configuring12-9
overview12-2
M
MAC addresses
allocating11-5
building tables9-2
convert dynamic to sticky secure29-2
displaying5-3
displaying in DHCP snooping binding table30-10
in ACLs32-11
sticky29-2
sticky secure, adding29-2
MAC extended access lists32-11
macros
See SmartPort macros
mapping
DSCP markdown values26-22
DSCP values to transmit queues26-38
mapping tables
configuring DSCP26-40
described26-13
mask destination command38-8
mask source command38-8
match ip address command23-3
maximum aging time (STP)
configuring11-18
member switches
in VMPS8-1
metro tags16-2
MFIB
CEF22-5
displaying22-18
overview22-11
modules
checking status5-1
powering down36-21
monitoring
802.1Q tunneling16-12
ACL information32-28
IGMP filters15-20
IGMP snooping15-11
Layer 2 protocol tunneling16-12
multi-VRF CE25-11
tunneling16-12
VLAN filters32-19
VLAN maps32-19
M-record13-2
MST
and multiple spanning trees1-4, 13-2
boundary ports13-6
BPDUs13-2
configuration parameters13-5
configuring13-9
displaying configurations13-13
edge ports13-7
enabling13-9
hop count13-7
instances
configuring parameters13-12
description13-2
number supported13-5
interoperability with PVST+13-2
link type13-7
master13-7
message age13-7
regions13-5, 13-6
restrictions13-8
to-SST interoperability13-4
MSTP
M-record13-2
M-tree13-2
M-tree13-2
MTU size
configuring4-11
MTU size (default)7-4
multicast
See IP multicast
multicast packets
blocking34-2
multicast routers
displaying routing tables22-16
flood suppression15-9
Multicast Storm Control
overview35-6
suppression on WS-X401435-7
suppression on WS-X401635-6
multiple forwarding paths1-4, 13-2
Multiple Spanning Tree
See MST
multiple VPN routing/forwarding in customer edge devices
See multi-VRF CE
multi-VRF CE
components25-3
configuration example25-7
default configuration25-3
defined25-1
displaying25-11
monitoring25-11
network components25-3
packet-forwarding process25-3
N
native VLAN
and 802.1Q tunneling16-4
specifying9-6
NetFlow
aggregation
minimum mask,default value38-8
destination-prefix aggregation
configuration (example)38-13
minimum mask, configuring38-8
IP
flow switching cache38-6
prefix aggregation
configuration (example)38-10
minimum mask, configuring38-8
source-prefix aggregation
minimum mask, configuring38-8
switching
configuration (example)38-9
configuring38-5
exporting cache entries38-6
statistics38-6
NetFlow statistics
caveats on supervisor38-4
configuring collection38-4
implementing collection38-4
overview of collection38-1
network fault tolerance1-4, 13-2
network management
configuring17-1
Next Hop Resolution Protocol
See NHRP
NFFC/NFFC II
IGMP snooping and15-4
NHRP
support1-8
non-IP traffic filtering32-11
non-RPF traffic
description22-9
in redundant configurations (figure)22-10
nonvolatile random-access memory
See NVRAM
normal-range VLANs
See VLANs
NVRAM
saving settings3-10
O
OIR
overview4-12
online insertion and removal
See OIR
Open Shortest Path First
See OSPF
operating system images
See system images
OSPF
area concept1-7
description1-7
P
packets
modifying26-14
packet type filtering37-14
packet type filtering, SPAN enhancement37-14
PAgP
understanding14-3
passwords
configuring enable password3-14
configuring enable secret password3-14
encrypting3-15
recovering lost enable password3-18
setting line password3-14
setting TACACS+3-15
PBR (policy-based routing)
configuration (example)23-5
enabling23-3
features23-2
overview23-1
route maps23-2
when to use23-2
per-port and VLAN Access Control List30-10
Per-VLAN Rapid Spanning Tree11-6
enabling11-20
overview11-6
PE to CE routing, configuring25-6
PIM
configuring dense mode22-14
configuring sparse mode22-14
displaying information22-15
displaying statistics22-20
enabling sparse-dense mode22-14, 22-15
overview22-3
PIM-DM22-3
PIM-SM22-3
ping
executing5-6
overview5-5
ping command5-6, 22-15
PoE36-22
configuring36-16
configuring power consumption for single device36-20
configuring power consumption for switch36-19
power consumption for powered devices
Intelligent Power Management36-20
powering down a module36-21
power management modes36-16
show interface status36-21
point-to-point
in 802.1X authentication (figure)28-2, 28-8
police command26-31
policed-DSCP map26-41
policers
description26-5
number of26-10
types of26-9
policies
See QoS policies
policing
See QoS policing
policy-map command26-28, 26-30
policy maps
attaching to interfaces26-33
configuring26-29
port ACLs
and voice VLAN32-4
defined32-2
limitations32-4
Port Aggregation Protocol
see PAgP
port-based authentication
changing the quiet period28-17
client, defined28-2
configuration guidelines28-12
configure 802.1X accounting28-15
configure switch-to-RADIUS server communication28-14
configure with Guest-VLANs28-16
configuring Guest-VLAN28-14
configuring manual re-authentication of a client28-17
controlling authorization state28-4
default configuration28-11
described28-2
device roles28-2
disabling28-13
displaying statistics28-21
enabling28-12
enabling multiple hosts28-20
enabling periodic re-authentication28-16
encapsulation28-2
initiation and message exchange28-3
method lists28-12
ports not supported28-4
resetting to default values28-20
setting retransmission number28-19
setting retransmission time28-18
topologies, supported28-9
using with port security28-6
with VLAN assignment28-5
port-based QoS features
See QoS
port-channel interfaces
See also EtherChannel
creating14-6
overview14-2
port-channel load-balance
command14-12
command example14-12
port-channel load-balance command14-12
port cost (STP)
configuring11-15
PortFast
and MST13-2
BPDU filter, configuring12-12
configuring or enabling12-11
overview12-3
PortFast BPDU filtering
and MST13-2
enabling12-12
overview12-4
PortFast STP parameter8-3
port priority
configuring MST instances13-12
configuring STP11-13
ports
blocking34-1
checking status5-2
community33-1
dynamic VLAN membership
configuring8-5
overview8-2
reconfirming8-7
forwarding, resuming34-3
isolated33-1
PVLAN types33-1
secure29-1
See also interfaces
port security
aging29-6
and QoS trusted boundary26-24
configuring29-4
default configuration29-3
described29-1
displaying29-7
RADIUS accounting28-7
sticky learning29-2
using with 802.1X28-6
violations29-2
with other features29-3
port states
description11-5
port trust state
See trust states
power, inline27-4
power dc input command36-10
power inline command36-17
power inline consumption command36-19, 36-20
power management
1+1 redundancy mode36-11
2+1 redundancy mode36-11
Catalyst 4006 switch36-10
Catalyst 4500 series36-3
Catalyst 4500 Series power supplies36-9
combined mode36-4
configuring combined mode36-8
configuring redundant mode36-7
overview36-1
redundancy36-10
redundant mode36-4
power over Ethernet
See PoE
power redundancy
setting on Catalyst 400636-13
power redundancy-mode command36-7
power supplies
fixed36-3
variable36-4
power supplies required command36-13
primary VLANs
associating with secondary VLANs33-6
configuring as a PVLAN33-5
description33-1
priority
overriding CoS of incoming frames27-3
privileged EXEC mode2-5
privileges
changing default3-17
configuring levels3-16
exiting3-17
logging in3-17
promiscuous ports
configuring PVLAN33-7
description33-1
setting mode33-11
protocol timers11-4
provider edge devices25-2
pruning, VTP
See VTP pruning
pseudobridges
description13-5
PVACL30-10
PVLANs
802.1q support33-5
configuration guidelines33-3
configuring33-3
configuring a VLAN as33-5
configuring promiscuous ports33-7
host port
configuring a Layer 2 interface33-8
host ports
setting33-11
isolated VLANs33-1
overview33-1
permitting routing, example33-11
promiscuous mode
setting33-11
setting
interface mode33-11
Q
QoS
allocating bandwidth26-39
auto-QoS
configuration and defaults display26-18
configuration guidelines26-17
described26-15
displaying26-18
effects on NVRAM configuration26-16
enabling for VoIP26-17
basic model26-5
burst size26-26
classification26-5to 26-9
configuration guidelines26-23
auto-QoS26-17
configuring
auto-QoS26-15
DSCP maps26-40
traffic shaping26-39
trusted boundary26-24
VLAN-based26-34
creating policing rules26-27
default auto configuration26-15
default configuration26-21
definitions26-3
disabling on interfaces26-33
enabling on interfaces26-33
flowcharts26-7, 26-11
IP phones
automatic classification and queueing26-15
detection and trusted settings26-15, 26-24
overview26-1
packet modification26-14
port-based26-34
priority26-14
traffic shaping26-14
transmit rate26-39
trust states
trusted device26-24
VLAN-based26-34
See also COS; DSCP values; transmit queues
QoS active queue management
tracking queue length26-13
QoS labels
definition26-3
QoS mapping tables
CoS-to-DSCP26-40
DSCP-to-CoS26-42
policed-DSCP26-41
types26-13
QoS marking
description26-4
QoS policers
burst size26-26
numbers of26-10
types of26-9
QoS policing
definition26-4
described26-5, 26-9
QoS policy
attaching to interfaces26-10
overview of configuration26-27
QoS transmit queues
allocating bandwidth26-39
burst26-14
configuring26-38
configuring traffic shaping26-39
mapping DHCP values to26-38
maximum rate26-14
overview26-13
sharing link bandwidth26-14
Quality of service
See QoS
queueing26-5, 26-13
R
RADIUS server
configure to-Switch communication28-14
configuring settings28-15
parameters on the switch28-14
range command4-4
range macros
defining4-5
ranges of interfaces
configuring4-4
Rapid Spanning Tree
See RSTP
re-authentication of a client
configuring manual28-17
enabling periodic28-16
reduced MAC address11-2
redundancy (RPR)
configuring6-4
route processor redundancy6-3
supervisor engine and Cisco IOS software6-4
related documentationxxiii
reload command3-22
replication
description22-8
reserved-range VLANs
See VLANs
retransmission number
setting in 802.1X authentication28-19
retransmission time
changing in 802.1X authentication28-18
RIP
description1-7
ROM monitor
boot process and3-19
CLI2-6
root bridge
configuring11-9
selecting in MST13-2
root guard
and MST13-2
enabling12-8
overview12-2
routed packets
ACLs32-21
route-map (IP) command23-3
route maps
defining23-3
PBR23-2
route processor redundancy
See redundancy (RPR+)
router ACLs
description32-2
using with VLAN maps32-20
route targets
VPN25-3
Routing Information Protocol
See RIP
RPR+
See redundancy (RPR+)
RSPAN
configuration guidelines37-16
destination ports37-5
IDS37-2
monitored ports37-4
monitoring ports37-5
received traffic37-3
sessions
creating37-17
defined37-3
limiting source traffic to specific VLANs37-23
monitoring VLANs37-22
removing source (monitored) ports37-21
specifying monitored ports37-17
source ports37-4
transmitted traffic37-4
VLAN-based37-5
RSTP
compatibility13-3
description13-2
port roles13-3
port states13-4
S
SAID
See 802.10 SAID
scheduling26-13
defined26-4
overview26-5
secondary root switch11-12
secondary VLANs
associating with primary33-6
description33-2
permitting routing33-11
secure ports, configuring29-1
Security Association Identifier
See 802.10 SAID
servers, VTP
See VTP servers
service-policy command26-28
service-policy input command19-1, 26-33
service-provider networks
and customer VLANs16-2
Layer 2 protocols across16-7
set default interface command23-4
set interface command23-4
set ip default next-hop command23-4
set ip next-hop command23-4
show adjacency command21-9
show boot command3-24
show catalyst4000 chassis-mac-address command11-3
show cdp command17-2, 17-3
show cdp entry command17-4
show cdp interface command17-3
show cdp neighbors command17-4
show cdp traffic command17-4
show ciscoview package command1-15
show ciscoview version command1-15
show configuration command4-9
show debugging command17-4
show environment command36-1
show history command2-4
show interfaces command4-11, 4-13
show interfaces status command5-2
show ip cache flow aggregation destination-prefix command38-9
show ip cache flow aggregation prefix command38-9
show ip cache flow aggregation source-prefix command38-9
show ip cache flow command38-6
show ip cef command21-8
show ip interface command22-15
show ip local policy command23-5
show ip mroute command22-15
show ip pim interface command22-15
show l2protocol command16-11
show mac-address-table address command5-3
show mac-address-table interface command5-3
show mls entry command21-8
show module command5-1, 11-5
show PoE consumed36-22
show power command36-13
show power inline command36-21
show power inline consumption command36-19
show power supplies command36-7
show protocols command4-13
show running-config command
adding description for an interface4-9
checking your settings3-9
displaying ACLs32-14, 32-16, 32-23, 32-24
show startup-config command3-10
show users command5-4
show version command3-22
shutdown, command4-14
shutdown threshold for Layer 2 protocol packets16-9
shutting down
interfaces4-14
single spanning tree
See SST
slot numbers, description4-2
SmartPort macros
configuration guidelines10-4
configuring10-2
creating and applying10-4
default configuration10-2
defined10-1
displaying10-8
tracing10-4
SNMP
documentation1-12
support1-12
software
upgrading6-6
software configuration register3-19
software switching
description21-5
interfaces21-6
key data structures used22-7
SPAN
and ACLs37-5
configuration guidelines37-7
configuring37-6to 37-10
destination ports37-5
IDS37-2
monitored port, defined37-4
monitoring port, defined37-5
received traffic37-3
sessions
defined37-3
source ports37-4
transmitted traffic37-4
VLAN-based37-5
SPAN and RSPAN
concepts and terminology37-3
default configuration37-6
displaying status37-24
overview37-1
session limits37-6
SPAN destination ports
802.1X authentication not supported28-12
SPAN enhancements
access list filtering37-13
configuration example37-15
CPU port sniffing37-10
encapsulation configuration37-12
ingress packets37-12
packet type filtering37-14
spanning-tree backbonefast command12-15
spanning-tree cost command11-15
spanning-tree guard root command12-8
spanning-tree portfast bpdu-guard command12-12
spanning-tree portfast command12-11
spanning-tree port-priority command11-13
spanning-tree uplinkfast command12-14
spanning-tree vlan
command11-9
command example11-9
spanning-tree vlan command11-8
spanning-tree vlan cost command11-15
spanning-tree vlan forward-time command11-19
spanning-tree vlan hello-time command11-17
spanning-tree vlan max-age command11-18
spanning-tree vlan port-priority command11-13
spanning-tree vlan priority command11-17
spanning-tree vlan root primary command11-10
spanning-tree vlan root secondary command11-12
speed
configuring interface4-7
speed command4-7
SST
description13-2
interoperability13-4
static routes
configuring3-11
verifying3-12
statistics
displaying 802.1X28-21
displaying PIM22-20
NetFlow accounting38-6
sticky learning
configuration file29-2
defined29-2
disabling29-2
enabling29-2
saving addresses29-2
sticky MAC addresses
configuring29-4
defined29-2
Storm Control
disabling35-4
displaying35-4
enabling35-3
hardware-based, implementing35-2
overview35-1
STP
bridge ID11-2
configuring11-7to 11-20
creating topology11-4
defaults11-6
disabling11-19
enabling11-7
enabling extended system ID11-8
enabling Per-VLAN Rapid Spanning Tree11-20
forward-delay time11-18
hello time11-17
Layer 2 protocol tunneling16-7
maximum aging time11-18
overview11-1, 11-3
per-VLAN rapid spanning tree11-6
port cost11-15
Port Fast parameter8-3
port priority11-13
root bridge11-9
supervisor engine
configuring3-8to 3-13
copying files to standby6-7
default configuration3-1
default gateways3-11
environmental monitoring36-1
redundancy6-1
ROM monitor3-19
startup configuration3-18
static routes3-11
synchronizing configurations6-5
SVIs
and router ACLs32-3
switched packets
and ACLs32-20
Switched Port Analyzer
See SPAN
switching
NetFlow
configuration (example)38-9
configuring38-5
exporting cache entries38-6
switchport
show interfaces4-11
switchport access vlan command9-6, 9-8
switchport block multicast command34-2
switchport block unicast command34-2
switchport mode access command9-8
switchport mode dot1q-tunnel command16-6
switchport mode dynamic command9-6
switchport mode trunk command9-6
switch ports
See access ports
switchport trunk allowed vlan command9-6
switchport trunk encapsulation command9-6
switchport trunk encapsulation dot1q command9-3
switchport trunk encapsulation isl command9-3
switchport trunk encapsulation negotiate command9-3
switchport trunk native vlan command9-6
switchport trunk pruning vlan command9-6
switch-to-RADIUS server communication
configuring28-14
syslog messages36-2
system
reviewing configuration3-10
settings at startup3-21
system images
loading from Flash memory3-23
modifying boot field3-21
specifying3-23
system MTU
802.1Q tunneling16-5
maximums16-5
T
TACACS+
setting passwords3-15
tagged packets
802.1Q16-3
Layer 2 protocol16-7
TCAM programming and ACLs32-6
Telnet
accessing CLI2-2
disconnecting user sessions5-5
executing5-3
monitoring user sessions5-4
telnet command5-4
TFTP
configuration files in base directory3-5
configuring for autoconfiguration3-4
time exceeded messages5-7
timer
See login timer
Token Ring
media not supported (note)7-4, 24-3
TOS
description26-3
trace command5-7
traceroute
See IP traceroute
See Layer 2 Traceroute
traceroute mac command5-9
traceroute mac ip command5-9
traffic
blocking flooded34-2
traffic control
using ACLs (figure)32-4
using VLAN maps (figure)32-5
traffic shaping26-14
translational bridge numbers (defaults)7-4
transmit queues
See QoS transmit queues
transmit rate26-39
troubleshooting
with traceroute5-7
trunk ports
802.1x authentication not supported on28-12
configuring PVLAN33-9to 33-10
trunks
802.1Q restrictions9-5
configuring9-6
configuring access VLANs9-6
configuring allowed VLANs9-6
default interface configuration9-6
different VTP domains9-3
enabling to non-DTP device9-4
encapsulation9-3
specifying native VLAN9-6
understanding9-3
trusted boundary for QoS26-24
trust states
configuring26-35
tunneling
defined16-1
Layer 2 protocol16-7
tunnel ports
802.1Q, configuring16-6
described16-2
incompatibilities with other features16-5
type of service
See TOS
U
UDLD
default configuration18-2
disabling18-3
enabling18-3
overview18-1, 31-1
unauthorized ports with 802.1X28-4
unicast
See IP unicast
unicast flood blocking
configuring34-1
unicast traffic
blocking34-2
unidirectional ethernet
enabling19-1
example of setting19-2
overview19-1
UniDirectional Link Detection Protocol
See UDLD
UplinkFast
and MST13-2
enabling12-14
MST and13-3
overview12-5
user EXEC mode2-5
user sessions
disconnecting5-5
monitoring5-4
V
VACLs
Layer 4 port operations32-7
virtual LANs
See VLANs
Virtual Private Network
See VPN
VLAN ACLs
See VLAN maps
vlan command7-6, 7-7
vlan database command7-7
vlan dot1q tag native command16-4
VLAN Management Policy Server
See VMPS
VLAN maps
applying32-16, 32-24
common uses for32-16
configuration example32-17
configuration guidelines32-13
configuring32-12
creating entries32-13
defined32-3
denying access example32-18
denying packets32-14
displaying32-19
examples32-18
order of entries32-13
permitting packets32-14
router ACLs and32-20
using (figure)32-5
VLAN Query Protocol (VQP)8-1
VLANs
allowed on trunk9-6
configuration guidelines7-3
configuring7-4
customer numbering in service-provider networks16-3
default configuration7-4
description1-5
extended range7-3
IDs (default)7-4
interface assignment7-8
limiting source traffic with RSPAN37-23
monitoring with RSPAN37-22
name (default)7-4
normal range7-3
overview7-1
reserved range7-3
See also PVLANs
VLAN Trunking Protocol
See VTP
VLAN trunks
overview9-3
VMPS
administering8-5
dynamic port membership
configuring8-5
overview8-2
reconfirming8-7
in a cluster of switches8-1
monitoring8-5
overview8-1
reconfirming assignments8-7
reconfirming membership interval8-7
voice interfaces
configuring27-1
Voice over IP
configuring27-1
voice ports
configuring VVID27-2
voice traffic27-4, 36-16
VPN
configuring routing in25-5
forwarding25-3
in service provider networks25-1
routes25-2
routing and forwarding table
See VRF
VRF
defining25-3
tables25-1
VTP
configuration guidelines24-5
configuring24-6to 24-10
configuring transparent mode24-9
default configuration24-5
disabling24-9
Layer 2 protocol tunneling16-7
monitoring24-10
overview24-1
See also VTP version 2
VTP advertisements
description24-3
VTP clients
configuring24-8
VTP domains
description24-2
VTP modes24-2
VTP pruning
enabling24-6
overview24-3
VTP servers
configuring24-7
VTP statistics
displaying24-10
VTP version 2
enabling24-7
overview24-3
See also VTP
VVID
configuring27-2