- Index
- Preface
- Product Overview
- Command-Line Interfaces
- Configuring the Switch for the First Time
- Administering the Switch
- Configuring Interfaces
- Checking Port Status and Connectivity
- Configuring Supervisor Engine Redundancy Using RPR and SSO
- Configuring NSF with SSO Supervisor Engine Redundancy
- Configuring In Service Software Upgrade Process
- Configuring Control Plane Policing
- Environmental Monitoring and Power Management
- Configuring Power over Ethernet
- Configuring Switches with Cisco Network Assistant
- Configuring VLANs, VTP, and VMPS
- Configuring IP Unnumbered Interface
- Configuring Layer 2 Ethernet Interfaces
- Configuring SmartPort Macros
- Configuring STP and MST
- Configuring Optional STP Features
- Configuring EtherChannel
- Configuring IGMP Snooping and Filtering
- Configuring 802.1Q and Layer 2 Protocol Tunneling
- Configuring CDP
- Configuring UDLD
- Configuring Unidirectional Ethernet
- Configuring Layer 3 Interfaces
- Configuring Cisco Express Forwarding
- Configuring IP Multicast
- Configuring Policy-Based Routing
- Configuring VRF-lite
- Configuring QoS
- Configuring Voice Interfaces
- Configuring 802.1X Port-Based Authentication
- Configuring Port Security
- Configuring DHCP Snooping and IP Source Guard
- Configuring Dynamic ARP Inspection
- Configuring the AGM for the First Time
- Configuring Network Security with ACLs
- Configuring Private VLANs
- Configuring Port Unicast and Multicast Flood Blocking
- Configuring Port-Based Traffic Control
- Configuring SPAN and RSPAN
- Configuring System Message Logging
- Configuring SNMP
- Configuring NetFlow
- Configuring RMON
- Performing Diagnostics on the Catalyst 4500 Series Switch
- Configuring WCCPv2 Services
- Configuring MIB Support
- ROM Monitor
- Acronyms
Index
Numerics
10/100 autonegotiation feature, forced6-8
10-Gigabit Ethernet port
deploy with Gigabit Ethernet SFP ports6-6
802.10 SAID (default)13-4
802.1Q
trunks17-6
tunneling
compatibility with other features21-5
defaults21-4
described21-2
tunnel ports with other features21-6
802.1Q VLANs
encapsulation15-3
trunk restrictions15-5
802.1s
802.1w
802.1X
802.1X authentication
for Critical Authentication32-10
for guest VLANs32-8
for MAC Authentication Bypass32-9
for Wake-on-LAN32-11
RADIUS accounting32-15
with port security32-13
with VLAN assignment32-6
with voice VLAN ports32-18
802.3ad
A
AAA34-1
abbreviating commands2-5
access control entries
access control entries and lists34-1
access list filtering, SPAN enhancement41-13
access lists
using with WCCP47-7
access ports
and Layer 2 protocol tunneling21-9
configure port security33-6, 33-21
configuring15-8
access VLANs15-6
accounting
configuring for 802.1X32-27
ACEs
ACLs37-2
Ethernet37-2
IP37-2
Layer 4 operation restrictions37-9
ACEs and ACLs34-1
ACLs
ACEs37-2
and SPAN41-5
and TCAM programming37-6
applying on routed packets37-22
applying on switched packets37-21
compatibility on the same switch37-3
configuring with VLAN maps37-21
CPU impact37-11
hardware and software support37-5
IP, matching criteria for port ACLs37-4
MAC extended37-12
matching criteria for router ACLs37-3
port
and voice VLAN37-4
defined37-2
limitations37-4
processing37-11
troubleshooting49-1
types supported37-2
acronyms, list ofA-1
active queue management30-14
adding members to a community12-8
addresses
displaying the MAC address table4-30
dynamic
changing the aging time4-21
defined4-19
learning4-20
removing4-22
MAC, discovering4-30
static
adding and removing4-27
defined4-19
address resolution4-30
adjacency tables
description26-2
displaying statistics26-9
advertisements, VTP
aging time
MAC address table4-21
alarms
major10-2
minor10-2
ARP
defined4-30
table
address resolution4-30
managing4-30
asymmetrical links, and 802.1Q tunneling21-4
audiencexxix
authentication
NTP associations4-4
See also port-based authentication
TACACS+
defined3-16
key3-18
login3-19
Authentication, Authorization, and Accounting (AAA)34-1
Authentication Failed VLAN assignment
configure with 802.1X32-35
authentication server
defined32-3
RADIUS server32-3
authoritative time source, described4-2
authorization
authorized and unauthorized ports32-4
authorized ports with 802.1X32-4
automatic discovery
considerations12-6
automatic QoS
Auto-MDIX on a port
configuring6-17
displaying the configuration6-17
overview6-16
autonegotiation feature
forced 10/100Mbps6-8
Auto-QoS
configuring30-17
auto-sync command8-7
B
b50-3
BackboneFast
adding a switch (figure)18-3
and MST17-23
configuring18-15
link failure (figure)18-13, 18-14
not supported MST17-23
understanding18-12
banners
configuring
login4-19
message-of-the-day login4-18
default configuration4-18
when displayed4-17
b flash command50-3
BGP1-7
routing session with multi-VRF CE29-7
blocking packets39-1
blocking state (STP)
RSTP comparisons (table)17-24
boot bootldr command3-31
boot command3-27
boot commands50-3
boot fields
See configuration register boot fields
bootstrap program
boot system flash command3-28
Border Gateway Protocol
boundary ports
description17-27
BPDU Guard
and MST17-23
configuring18-15
overview18-7
BPDUs
and media speed17-2
pseudobridges and17-25
what they contain17-3
bridge ID
bridge priority (STP)17-16
bridge protocol data units
broadcast storm control
disabling40-4
BSR
configuration example27-21
burst rate30-53
burst size30-28
C
cache engine clustersxxxi, 47-1
cache farms
candidates
automatic discovery12-6
candidate switch, cluster
defined12-12
requirements12-12
cautions for passwords
encrypting3-22
CDP
and trusted boundary30-26
automatic discovery in communities12-6
configuration22-2
displaying configuration22-3
enabling on interfaces22-3
Layer 2 protocol tunneling21-7
maintaining22-3
monitoring22-3
cdp enable command22-3
CEF
adjacency tables26-2
and NSF with SSO9-5
configuring load balancing26-7
displaying statistics26-8
enabling26-6
hardware switching26-4
load balancing26-6
overview26-1
software switching26-4
CGMP
overview20-1
channel-group group command19-7, 19-10
Cisco 7600 series Internet router
enabling SNMP48-16
Cisco Discovery Protocol
Cisco Express Forwarding
Cisco Group Management Protocol
Cisco IOS NSF-aware
support9-2
Cisco IOS NSF-capable support9-2
Cisco IP Phones
configuring31-2
sound quality31-1
CiscoWorks 200043-4
CIST
description17-22
class-map command30-30
class of service
clear cdp counters command22-4
clear cdp table command22-3
clear counters command6-19
clearing
IP multicast table entries27-20
clear ip eigrp neighbors command25-11
clear ip flow stats command44-9
CLI
accessing2-1
backing out one level2-5
getting commands2-5
history substitution2-3
managing clusters12-12
modes2-5
monitoring environments41-1
ROM monitor2-7
software basics2-4
clients
in 802.1X authentication32-2
clock
clustering switches
command switch characteristics12-11, 12-12
and VTY12-11
convert to a community12-9
managing
through CLI12-12
overview12-10
planning considerations
CLI12-12
passwords12-7
command-line processing2-3
command modes2-5
commands
b flash50-3
boot50-3
confreg50-3
dev50-3
dir device50-3
frame50-5
i50-3
listing2-5
meminfo50-5
reset50-3
ROM monitor debugging50-5
SNMP48-16
sysret50-5
command switch, cluster
requirements12-11
common and internal spanning tree
common spanning tree
community of switches
access modes in Network Assistant12-8
adding devices12-8
candidate characterisitcs12-6
communication protocols12-8
community name12-7
configuration information12-8
converting from a cluster12-9
host name12-7
passwords12-7
community ports38-4
community strings
configuring43-7
overview43-4
and SPAN features38-11
configure as a PVLAN38-12
compiling MIBs48-16
config-register command3-28
config terminal command3-9
configurable leave timer,IGMP20-3
configuration examples
SNMP43-15
configuration files
limiting TFTP server access43-15
obtaining with DHCP3-6
saving3-10
system contact and location information43-14
configuration guidelines
SNMP43-6
configuration register
boot fields
listing value3-29
modifying3-28
changing from ROM monitor50-3
configuring3-26
settings at startup3-27
configure terminal command3-28, 6-2
confreg command50-3
console configuration mode2-5
console port
disconnecting user sessions7-6
monitoring user sessions7-6
control plane policing
CoPP
applying QoS service policy to control plane34-3
configuring
ACLs to match traffic34-3
enabling MLS QoS34-3
packet classification criteria34-3
service-policy map34-3
control plane configuration mode
entering34-3
displaying
dynamic information34-7
number of conforming bytes and packets34-7
rate information34-7
entering control plane configuration mode34-3
monitoring statistics34-7
overview34-1
copy running-config startup-config command3-10
copy system:running-config nvram:startup-config command3-31
CoS
configuring port value30-50
definition30-3
figure30-2
overriding on Cisco IP Phones31-4
priority31-4
CoS Mutation
configuring30-38
CoS-to-DSCP maps30-54
counters
clearing MFIB27-20
clearing on interfaces6-19
CPU port sniffing41-10
Critical Authentication
configure with 802.1X32-32
CST
description17-25
IST and17-22
MST and17-22
customer edge devices29-2
D
daylight saving time4-13
debug commands, ROM monitor50-5
default configuration
802.1X32-20
auto-QoS30-17
banners4-18
DNS4-16
IGMP filtering20-18
Layer 2 protocol tunneling21-9
MAC address table4-21
multi-VRF CE29-4
NTP4-4
private VLANs38-10
RMON45-3
SNMP43-6
SPAN and RSPAN41-6
system message logging42-3
system name and prompt4-15
TACACS+3-18
default gateway
configuring3-11
verifying configuration3-11
default settings, erase commad3-31
deploying 10-Gigabit Ethernet and a Gigabit Ethernet SFP ports6-6
description command6-10
detecting unidirectional links23-1
dev command50-3
DHCP-based autoconfiguration
client request message exchange3-3
configuring
client side3-2
DNS3-5
relay device3-5
server-side3-3
TFTP server3-4
example3-7
lease options
for IP address information3-3
for receiving the configuration file3-4
relationship to BOOTP3-2
DHCP snooping
configuring35-3
default configuration35-3
displaying binding tables35-10
displaying configuration35-11
enabling35-4
enabling on private VLAN35-6
enabling the database agent35-6
overview35-1
Snooping database agent35-2
DHCP Snooping Database Agent
adding to the database (example)35-9
enabling (example)35-7
overview35-2
reading from a TFTP file (example)35-8
Diagnostics
online46-1
troubleshooting46-2
Power-On-Self-Test
causes of failure46-13
how it works46-3
overview46-3
Power-On-Self-Test for Supervisor Engine V-10GE46-7
Differentiated Services Code Point values
DiffServ architecture, QoS30-2
Digital optical monitoring transceiver support6-7
dir device command50-3
disabled state
RSTP comparisons (table)17-24
disabling
broadcast storm control40-4
disconnect command7-6
discovery, clusters
DNS
and DHCP-based autoconfiguration3-5
default configuration4-16
displaying the configuration4-17
overview4-15
setting up4-16
documentation
organizationxxix
relatedxxxii
domain names
DNS4-15
Domain Name System
double-tagged packets
802.1Q tunneling21-2
Layer 2 protocol tunneling21-9
drop threshold for Layer 2 protocol packets21-10
DSCP maps30-54
DSCP-to-CoS maps
configuring30-56
DSCP values
configuring maps30-54
configuring port value30-51
definition30-4
IP precedence30-2
mapping markdown30-24
mapping to transmit queues30-52
DTP
VLAN trunks and15-3
duplex command6-9
duplex mode
configuring interface6-8
dynamic ARP inspection
ARP cache poisoning36-2
configuring
ACLs for non-DHCP environments36-10
in DHCP environments36-5
log buffer36-14
rate limit for incoming ARP packets36-16
denial-of-service attacks, preventing36-16
interface trust state, security coverage36-3
log buffer
configuring36-14
logging of dropped packets36-4
overview36-1
port channels, their behavior36-4
priority of static bindings36-4
purpose of36-2
rate limiting of ARP packets36-4
configuring36-16
validation checks, performing36-18
Dynamic Host Configuration Protocol snooping
dynamic port VLAN membership
example13-26
limit on hosts13-25
reconfirming13-23
troubleshooting13-25
Dynamic Trunking Protocol
E
EAP frames
changing retransmission time32-40
exchanging (figure)32-4, 32-6, 32-10
request/identity32-3
response/identity32-3
setting retransmission number32-41
EAPOL frames
802.1X authentication and32-3
OTP authentication, example (figure)32-4, 32-6, 32-10
start32-3
edge ports
description17-27
EGP
overview1-7
EIGRP (Enhanced IGRP)
stub routing
benefits25-10
configuration tasks25-10
configuring25-6
overview25-6
restrictions25-10
verifying25-11
EIGRP (enhanced IGRP)
overview1-7
eigrp stub command25-11
Embedded CiscoView
displaying information4-34
installing and configuring4-31
overview4-31
enable mode2-5
enabling SNMP48-16
encapsulation types15-3
Enhanced Interior Gateway Routing Protocol
environmental monitoring
LED indications10-2
SNMP traps10-2
supervisor engine10-2
switching modules10-2
using CLI commands10-1
EtherChannel
channel-group group command19-7, 19-10
configuration guidelines19-5
configuring Layer 219-9
configuring Layer 319-6
interface port-channel command19-7
lacp system-priority
command example19-12
modes19-3
overview19-1
PAgP
Understanding19-3
physical interface configuration19-7
port-channel interfaces19-2
port-channel load-balance command19-12
removing19-14
removing interfaces19-13
explicit host tracking
enabling20-10
extended range VLANs
Extensible Authentication Protocol over LAN32-1
Exterior Gateway Protocol
F
FastDrop
clearing entries27-20
displaying entries27-19
overview27-10
FIB
description26-2
filtering
in a VLAN37-14
non-IP traffic37-12
flags27-11
Flash memory
configuring router to boot from3-30
loading system images from3-30
security precautions3-30
flooded traffic, blocking39-2
flow control, configuring6-11
forward-delay time (STP)
configuring17-18
forwarding information base
frame command50-5
G
gateway
get-bulk-request operation43-3
get-next-request operation43-3, 43-4
get-request operation43-3, 43-4
get-response operation43-3
Gigabit Ethernet SFP ports
deploy with 10-Gigabit Ethernet6-6
global configuration mode2-5
Guest-VLANs
configure with 802.1X32-28, 32-36
H
hardware and software ACL support37-5
hardware switching26-5
hello time (STP)
configuring17-17
high CPU, troubleshooting49-8
history
CLI2-3
history table, level and number of syslog messages42-9
hop counts
configuring MST bridges17-28
host
configuring host statically20-10
limit on dynamic port13-25
host ports
kinds of38-4
Hot Standby Routing Protocol
HSRP
description1-6
hw-module module num power command10-17
I
ICMP
enabling7-11
ping7-7
running IP traceroute7-8
time exceeded messages7-8
i command50-3
IDS
using with SPAN and RSPAN41-2
IEEE 802.1s
IEEE 802.1w
IEEE 802.3ad
IGMP
configurable leave timer
enabling20-8
configurable-leave timer20-3
description27-3
enabling27-13
explicit host tracking20-4, 20-10
immediate-leave processing20-3
overview20-1
IGMP filtering
configuring20-18
default configuration20-18
described20-18
monitoring20-21
IGMP groups
setting the maximum number20-20
IGMP Immediate Leave
configuration guidelines20-8
IGMP profile
applying20-19
configuration mode20-18
configuring20-19
IGMP snooping
configuration guidelines20-4
IP multicast and27-4
monitoring20-13
overview20-1
IGRP
description1-7
immediate-leave processing
enabling20-8
IGMP
ingress packets, SPAN enhancement41-12
inline power
configuring on Cisco IP phones31-5
insufficient inline power handling for Supervisor Engine II-TS10-15
Intelligent Power Management11-4
interface port-channel command19-7
interface range command6-4
interface range macro command6-5
interfaces
adding descriptive name6-10
clearing counters6-19
configuring6-2
configuring ranges6-4
displaying information about6-19
Layer 2 modes15-4
maintaining6-18
monitoring6-18
naming6-10
numbers6-2
overview6-1
restarting6-20
Interior Gateway Routing Protocol
Internet Control Message Protocol
Internet Group Management Protocol
Inter-Switch Link encapsulation
Intrusion Detection System
IP
configuring default gateway3-11
configuring static routes3-11
displaying statistics26-8
flow switching cache44-9
IP addresses
cluster candidate or member12-12
cluster command switch12-11
discovering4-30
ip cef command26-6
IP Enhanced IGRP
interfaces, displaying25-11
ip flow-aggregation cache destination-prefix command44-11
ip flow-aggregation cache prefix command44-11
ip flow-aggregation cache source-prefix command44-12
ip flow-export command44-9
ip icmp rate-limit unreachable command7-12
ip igmp profile command20-18
ip igmp snooping tcn flood command20-12
ip igmp snooping tcn flood query count command20-12
ip igmp snooping tcn query solicit command20-13
IP information
assigned
through DHCP-based autoconfiguration3-2
ip load-sharing per-destination command26-7
ip local policy route-map command28-5
ip mask-reply command7-13
IP multicast
clearing table entries27-20
configuring27-12
default configuration27-13
displaying PIM information27-15
displaying the routing table information27-16
enabling27-13
enabling dense-mode PIM27-14
enabling sparse-mode27-14
features not supported27-12
hardware forwarding27-8
monitoring27-15
overview27-1
routing protocols27-2
software forwarding27-8
See also Auto-RP; IGMP; PIM; RP; RPF
ip multicast-routing command27-13
IP phones
automatic classification and queueing30-17
configuring voice ports31-3
See Cisco IP Phones31-1
trusted boundary for QoS30-26
ip pim command27-14
ip pim dense-mode command27-14
ip pim sparse-dense-mode command27-15
ip policy route-map command28-4
ip redirects command7-12
ip route-cache flow command44-7
IP routing tables
deleting entries27-20
IP Source Guard
configuring35-12
configuring on private VLANs35-13
overview35-11
IP statistics
displaying26-8
IP traceroute
executing7-8
overview7-8
IP unicast
displaying statistics26-8
troubleshooting49-18
IP Unnumbered support
configuring on a range of Ethernet VLANs14-5
configuring on LAN and VLAN interfaces14-4
configuring with connected host polling14-6
DHCP Option 8214-2
displaying settings14-7
format of agent remote ID suboptions14-3
troubleshooting14-8
with conected host polling14-3
with DHCP server and Relay agent14-2
ip unreachables command7-11
IPX
redistribution of route information with EIGRP1-7
ISL
encapsulation15-3
trunking with 802.1Q tunneling21-4
isolated port38-4
ISSU
compatibility matrix5-12
compatiblity verification using Cisco Feature Navigator5-13
NSF overview5-3
perform the process
aborting a software upgrade5-24
configuring the rollback timer as a safeguard5-25
displaying a compatibility matrix5-27
loading the new software on the new standby5-22
stopping the rollback timer5-21
switching to the standby5-19
verify the ISSU state5-16
verify the redundancy mode5-14
verify the software installation5-14
vload the new software on standby5-16
prerequisites5-2
process overview5-6
restrictions5-2
SNMP support5-13
SSO overview5-3
versioning capability in software to support5-11
IST
and MST regions17-22
description17-22
master17-27
J
jumbo frames
and ethernet ports6-14
configuring MTU sizes for6-15
ports and linecards that support6-13
VLAN interfaces6-14
K
keyboard shortcuts2-3
L
l2protocol-tunnel command21-11
labels, definition30-3
LACP
system ID19-4
Layer 2 access ports15-8
Layer 2 frames
classification with CoS30-2
Layer 2 interfaces
assigning VLANs13-8
configuring15-5
configuring as PVLAN host ports38-16
configuring as PVLAN promiscuous ports38-14
configuring as PVLAN trunk ports38-17
defaults15-5
disabling configuration15-9
modes15-4
show interfaces command15-7
Layer 2 interface type
resetting38-21
setting38-21
Layer 2 protocol tunneling
default configuration21-9
guidelines21-10
Layer 2 switching
overview15-1
Layer 2 Traceroute
and ARP7-10
and CDP7-9
host-to-host paths7-9
IP addresses and subnets7-10
MAC addresses and VLANs7-10
multicast traffic7-10
multiple devices on a port7-10
usage guidelines7-9
Layer 2 trunks
configuring15-6
overview15-3
Layer 3 packets
classification methods30-2
Layer 4 port operations
configuration guidelines37-10
restrictions37-9
LEDs
description (table)10-2
listening state (STP)
RSTP comparisons (table)17-24
load balancing
configuring for CEF26-7
configuring for EtherChannel19-12
per-destination26-7
login authentication
with TACACS+3-19
login banners4-17
login timer
changing7-5
log messages
logoutwarning command7-6
loop guard
and MST17-23
configuring18-4
overview18-3
M
MAC addresses
aging time4-21
allocating17-5
and VLAN association4-20
convert dynamic to sticky secure33-5
default configuration4-21
discovering4-30
displaying in DHCP snooping binding table35-11
dynamic
learning4-20
removing4-22
in ACLs37-12
static
adding4-28
allowing4-29
characteristics of4-27
dropping4-29
removing4-28
sticky33-4
sticky secure, adding33-5
MAC Authentication Bypass
configure with 802.1X32-31
MAC extended access lists37-12
macros
main-cpu command8-7
management options
SNMP43-1
mapping
DSCP markdown values30-24
DSCP values to transmit queues30-52
mapping tables
configuring DSCP30-54
described30-14
mask destination command44-11
mask source command44-11, 44-12
Match CoS for non-IPV4 traffic
configuring30-32
match ip address command28-3
maximum aging time (STP)
configuring17-18
members
automatic discovery12-6
member switch
managing12-12
member switch, cluster
defined12-11
requirements12-12
meminfo command50-5
messages, to users through banners4-17
metro tags21-2
MFIB
CEF27-5
displaying27-18
overview27-11
MIBs
compiling48-16
overview43-1
related information48-15
SNMP interaction with43-4
modules
checking status7-1
powering down10-17
monitoring
802.1Q tunneling21-12
ACL information37-29
IGMP filters20-21
IGMP snooping20-13
Layer 2 protocol tunneling21-12
multi-VRF CE29-12
private VLANs38-21
traffic flowing among switches45-1
tunneling21-12
VLAN filters37-20
VLAN maps37-20
M-record17-23
MST
and multiple spanning trees1-3, 17-22
boundary ports17-27
BPDUs17-23
configuration parameters17-26
configuring17-29
displaying configurations17-34
edge ports17-27
enabling17-29
hop count17-28
instances
configuring parameters17-33
description17-22
number supported17-26
interoperability with PVST+17-23
link type17-28
master17-27
message age17-28
regions17-26
restrictions17-29
to-SST interoperability17-24
MSTP
M-record17-23
M-tree17-23
M-tree17-23
MTU size
default13-4
multicast
multicast packets
blocking39-2
multicast routers
displaying routing tables27-16
flood suppression20-10
Multicast Storm Control
overview40-6
suppression on WS-X401440-7
suppression on WS-X401640-6
multiple forwarding paths1-3, 17-22
Multiple Spanning Tree
multiple VPN routing/forwarding
multi-VRF CE
components29-4
configuration example29-8
default configuration29-4
defined29-1
displaying29-12
monitoring29-12
network components29-4
packet-forwarding process29-4
N
native VLAN
and 802.1Q tunneling21-4
specifying15-6
NetFlow
aggregation
minimum mask,default value44-11
destination-prefix aggregation
configuration (example)44-16
minimum mask, configuring44-11
IP
flow switching cache44-9
prefix aggregation
configuration (example)44-14
minimum mask, configuring44-11
source-prefix aggregation
minimum mask, configuring44-11
switching
checking for required hardware44-6
configuration (example)44-13
configuring switched IP flows44-8
enabling Collection44-7
exporting cache entries44-9
statistics44-9
NetFlow statistics
caveats on supervisor44-6
checking for required hardware44-6
configuring collection44-6
enabling Collection44-7
exporting cache entries44-9
overview of collection44-2
switched/bridged IP flows44-8
Network Assistant
and VTY12-11
configure
enable communication with switch12-13, 12-17
default configuration12-2
overview of CLI commands12-2
network fault tolerance1-3, 17-22
network management
configuring22-1
RMON45-1
SNMP43-1
Network Time Protocol
New Software Features in Release 7.7
TDR7-3
Next Hop Resolution Protocol
NFFC/NFFC II
IGMP snooping and20-4
NHRP
support1-7
non-IP traffic filtering37-12
non-RPF traffic
description27-9
in redundant configurations (figure)27-10
Nonstop Forwarding
nonvolatile random-access memory
normal-range VLANs
NSF
defined9-1
guidelines and restrictions9-9
operation9-4
NSF-aware
supervisor engines9-3
support9-2
NSF-capable
supervisor engines9-3
support9-2
NSF with SSO supervisor engine redundancy
and CEF9-5
overview9-4
SSO operation9-4
NTP
associations
authenticating4-4
defined4-2
enabling broadcast messages4-7
peer4-6
server4-6
default configuration4-4
displaying the configuration4-11
overview4-2
restricting access
creating an access group4-9
disabling NTP services per interface4-10
source IP address, configuring4-10
stratum4-2
synchronizing devices4-6
time
services4-2
synchronizing4-2
NVRAM
saving settings3-10
O
OIR
overview6-18
Online Diagnostics46-1
online insertion and removal
Open Shortest Path First
operating system images
OSPF
area concept1-8
description1-8
P
packets
modifying30-16
software processed
and QoS30-16
packet type filtering
overview41-15
SPAN enhancement41-15
PAgP
understanding19-3
passwords
configuring enable password3-14
configuring enable secret password3-14
encrypting3-22
in clusters12-7
recovering lost enable password3-24
setting line password3-14
PBR (policy-based routing)
configuration (example)28-5
enabling28-3
features28-2
overview28-1
route maps28-2
when to use28-2
PeerResetReason environmental variable
tracking supervisor engine resets49-24
per-port and VLAN Access Control List35-11
per-port per-VLAN QoS
enabling30-45
overview30-16
Per-VLAN Rapid Spanning Tree17-6
enabling17-20
overview17-6
PE to CE routing, configuring29-7
PIM
configuring dense mode27-14
configuring sparse mode27-14
displaying information27-15
displaying statistics27-20
enabling sparse-dense mode27-14, 27-15
overview27-3
PIM-DM27-3
PIM-SM27-3
ping
executing7-7
overview7-7
PoE11-8
configuring power consumption for single device11-5
configuring power consumption for switch11-5
power consumption for powered devices
Intelligent Power Management11-4
overview11-4
supported cabling topology11-6
powering down a module10-17
power management modes11-2
show interface status11-7
point-to-point
in 802.1X authentication (figure)32-2, 32-16
police command30-34
policed-DSCP map30-55
policers
description30-5
types of30-10
policies
policing
policy-map command30-30, 30-33
policy maps
attaching to interfaces30-37
configuring30-32
port ACLs
and voice VLAN37-4
defined37-2
limitations37-4
Port Aggregation Protocol
port-based authentication
802.1X with voice VLAN32-18
changing the quiet period32-39
client, defined32-2
configuration guidelines32-21
configure 802.1X accounting32-27
configure switch-to-RADIUS server communication32-24
configure with Authentication Failed VLAN assignment32-35
configure with Critical Authentication32-32
configure with Guest-VLANs32-28, 32-36
configure with MAC Authentication Bypass32-31
configure with Wake-on-LAN32-34
configuring Guest-VLAN32-24
configuring manual re-authentication of a client32-42
controlling authorization state32-4
default configuration32-20
described32-1
device roles32-2
displaying statistics32-43
enabling32-21
enabling multiple hosts32-38
enabling periodic re-authentication32-37
encapsulation32-3
initiation and message exchange32-3
method lists32-21
ports not supported32-4
resetting to default values32-43
setting retransmission number32-41
setting retransmission time32-40
topologies, supported32-19
using with port security32-13
with Critical Authentication32-10
with Guest VLANs32-8
with MAC Authentication Bypass32-9
with VLAN assignment32-6
port-based QoS features
port-channel interfaces
creating19-6
overview19-2
port-channel load-balance
command19-12
command example19-12
port-channel load-balance command19-12
port cost (STP)
configuring17-15
PortFast
and MST17-23
BPDU filter, configuring18-8
configuring or enabling18-15
overview18-5
PortFast BPDU filtering
and MST17-23
enabling18-8
overview18-8
port priority
configuring MST instances17-33
configuring STP17-13
ports
blocking39-1
checking status7-2
dynamic VLAN membership
example13-26
reconfirming13-23
forwarding, resuming39-3
port security
aging33-5
and QoS trusted boundary30-26
configuring33-7
displaying33-26
guidelines and restrictions33-31
on private VLAN33-13
host33-14
over Layer 2 EtherChannel33-31
promiscuous33-15
on trunk port33-16
guidelines and restrictions33-14, 33-17, 33-20, 33-31
port mode changes33-21
on voice ports33-21
RADIUS accounting32-15
sticky learning33-5
troubleshooting
common system error messages33-34
verifying that an address is secure33-32
using with 802.1X32-13
violations33-5
with 802.1X Authentication33-30
with DHCP and IP Source Guard33-30
with other features33-31
port states
description17-5
port trust state
power
inline31-5
power dc input command10-14
power handling for Supervisor Engine II-TS11-12
power inline command11-3
power inline consumption command11-5
power management
Catalyst 4500 series10-3
Catalyst 4500 Series power supplies10-9
Catalyst 4948 series10-17
combined mode10-5
configuring combined mode10-8
configuring redundant mode10-7
overview10-1
redundancy10-3
redundant mode10-5
Power-On-Self-Test diagnostics46-3, 46-13
Power-On-Self-Test for Supervisor Engine V-10GE46-7
power redundancy-mode command10-8
power supplies
fixed10-4
associating with secondary VLANs38-13
configuring as a PVLAN38-12
priority
overriding CoS of incoming frames31-4
private VLAN
configure port security33-14
private VLANs
across multiple switches38-5
and SVIs38-9
benefits of38-2
community ports38-4
default configuration38-10
end station access to38-3
isolated port38-4
monitoring38-21
ports
community38-4
isolated38-4
promiscuous38-5
promiscuous ports38-5
secondary VLANs38-3
subdomains38-2
traffic in38-8
troubleshooting
common system error messages38-23
verifying that an address is secure38-23
privileged EXEC mode2-5
privileges
changing default3-23
configuring levels3-23
exiting3-24
logging in3-23
promiscuous ports
configuring PVLAN38-14
defined38-5
setting mode38-21
protocol timers17-4
provider edge devices29-2
pruning, VTP
pseudobridges
description17-25
PVACL35-11
PVID (port VLAN ID)
and 802.1X with voice VLAN ports32-18
PVLAN promiscuous trunk port
PVLANs
802.1q support38-12
across multiple switches38-5
configuration guidelines38-10
configure port security33-13, 33-15, 33-17
configure port security in a wireless setting33-31
configure port security over Layer 2 EtherChannel33-31
configuring38-9
configuring a VLAN38-12
configuring promiscuous ports38-14
host ports
configuring a Layer 2 interface38-16
setting38-21
overview38-1
permitting routing, example38-20
promiscuous mode
setting38-21
setting
interface mode38-21
Q
QoS
allocating bandwidth30-53
and software processed packets30-16
auto-QoS
configuration and defaults display30-20
configuration guidelines30-18
described30-17
displaying30-20
effects on NVRAM configuration30-18
enabling for VoIP30-19
basic model30-5
burst size30-28
configuration guidelines30-25
auto-QoS30-18
configuring
auto-QoS30-17
DSCP maps30-54
traffic shaping30-53
trusted boundary30-26
VLAN-based30-48
configuring UBRL30-39
creating policing rules30-29
default auto configuration30-17
default configuration30-23
definitions30-3
disabling on interfaces30-37
enabling and disabling30-47
enabling on interfaces30-37
enabling per-port per-VLAN30-45
IP phones
automatic classification and queueing30-17
detection and trusted settings30-17, 30-26
overview30-1
overview of per-port per-VLAN30-16
packet modification30-16
port-based30-48
priority30-15
traffic shaping30-15
transmit rate30-53
trust states
trusted device30-26
VLAN-based30-48
See also COS; DSCP values; transmit queues
QoS active queue management
tracking queue length30-14
QoS labels
definition30-3
QoS mapping tables
CoS-to-DSCP30-54
DSCP-to-CoS30-56
policed-DSCP30-55
types30-14
QoS marking
description30-5
QoS policers
burst size30-28
types of30-10
QoS policing
definition30-5
QoS policy
attaching to interfaces30-11
overview of configuration30-30
QoS transmit queues
allocating bandwidth30-53
burst30-15
configuring30-51
configuring traffic shaping30-53
mapping DHCP values to30-52
maximum rate30-15
overview30-14
sharing link bandwidth30-15
Quality of service
R
RADIUS server
configure to-Switch communication32-24
configuring settings32-26
parameters on the switch32-24
range command6-4
range macros
defining6-5
ranges of interfaces
configuring6-4
Rapid Spanning Tree
rcommand command12-12
re-authentication of a client
configuring manual32-42
enabling periodic32-37
reduced MAC address17-2
redundancy
configuring8-7
guidelines and restrictions8-5
changes made through SNMP8-11
NSF-aware support9-2
NSF-capable support9-2
overview8-2
redundancy command8-7
understanding synchronization8-4
redundancy (NSF)9-1
configuring
BGP9-11
CEF9-11
EIGRP9-16
IS-IS9-14
OSPF9-13
routing protocols9-5
redundancy (RPR)
route processor redundancy8-3
synchronization8-5
redundancy (SSO)
redundancy command9-10
route processor redundancy8-3
synchronization8-5
related documentationxxxii
Remote Network Monitoring
replication
description27-8
reserved-range VLANs
reset command50-3
resetting a switch to defaults3-31
restricting access
NTP services4-8
TACACS+3-15
retransmission number
setting in 802.1X authentication32-41
retransmission time
changing in 802.1X authentication32-40
RFC
1157, SNMPv143-2
1305, NTP4-2
1757, RMON45-2
1901, SNMPv2C43-2
1902 to 1907, SNMPv243-2
2273-2275, SNMPv343-2
RIP
description1-8
RMON
default configuration45-3
displaying status45-6
enabling alarms and events45-3
groups supported45-2
overview45-1
ROM monitor
boot process and3-25
CLI2-7
debug commands50-5
entering50-2
exiting50-6
overview50-1
root bridge
configuring17-9
selecting in MST17-22
root guard
and MST17-23
enabling18-2
overview18-2
routed packets
ACLs37-22
route-map (IP) command28-3
route maps
defining28-3
PBR28-2
router ACLs
description37-2
using with VLAN maps37-21
route targets
VPN29-4
Routing Information Protocol
RSPAN
configuration guidelines41-16
destination ports41-5
IDS41-2
monitored ports41-4
monitoring ports41-5
received traffic41-3
sessions
creating41-17
defined41-3
limiting source traffic to specific VLANs41-23
monitoring VLANs41-22
removing source (monitored) ports41-21
specifying monitored ports41-17
source ports41-4
transmitted traffic41-4
VLAN-based41-5
RSTP
compatibility17-23
description17-22
port roles17-23
port states17-24
S
SAID
scheduling30-14
defined30-5
overview30-6
secondary root switch17-12
secondary VLANs38-3
associating with primary38-13
permitting routing38-20
security
configuring34-1
Security Association Identifier
sequence numbers in log messages42-7
servers, VTP
service-policy command30-30
service-policy input command24-2, 30-37
service-provider networks
and customer VLANs21-2
set default interface command28-4
set interface command28-4
set ip default next-hop command28-4
set ip next-hop command28-4
set-request operation43-4
severity levels, defining in system messages42-8
sharing adjacencies
troubleshooting49-20
show adjacency command26-9
show boot command3-31
show catalyst4000 chassis-mac-address command17-3
show cdp entry command22-4
show cdp interface command22-3
show cdp neighbors command22-4
show cdp traffic command22-4
show ciscoview package command4-34
show ciscoview version command4-34
show cluster members command12-12
show configuration command6-10
show debugging command22-4
show environment command10-2
show history command2-4
show interfaces command6-15, 6-19, 6-21
show interfaces status command7-2
show ip cache flow aggregation destination-prefix command44-12
show ip cache flow aggregation prefix command44-12
show ip cache flow aggregation source-prefix command44-12
show ip cache flow command44-9
show ip cef command26-8
show ip eigrp interfaces command25-11
show ip eigrp neighbors command25-11
show ip eigrp topology command25-11
show ip eigrp traffic command25-11
show ip interface command27-15
show ip local policy command28-5
show ip mroute command27-15
show ip pim interface command27-15
show l2protocol command21-12
show mac-address-table address command7-3
show mac-address-table interface command7-3
show mls entry command26-8
show PoE consumed11-8
show power inline command11-7
show power inline consumption command11-5
show power supplies command10-8
show protocols command6-19
show running-config command
adding description for an interface6-10
checking your settings3-9
displaying ACLs37-15, 37-17, 37-24, 37-25
show startup-config command3-10
show users command7-6
show version command3-28, 3-29
shutdown, command6-20
shutdown threshold for Layer 2 protocol packets21-9
shutting down
interfaces6-20
Simple Network Management Protocol
single spanning tree
slot numbers, description6-2
Smartports macros
applying global parameter values16-8
applying macros16-8
applying parameter values16-9
configuration guidelines16-6
configuring16-2
creating16-8
default configuration16-4
defined16-1
displaying16-13
tracing16-7
website16-2
SNMP
accessing MIB variables with43-4
agent
described43-4
disabling43-7
authentication level43-10
community strings
configuring43-7
overview43-4
configuration examples43-15
configuration guidelines43-6
default configuration43-6
enabling48-16
engine ID43-6
host43-6
informs
and trap keyword43-11
described43-5
differences from traps43-5
enabling43-14
limiting access by TFTP servers43-15
limiting system log messages to NMS42-9
manager functions43-3
notifications43-5
status, displaying43-16
system contact and location43-14
trap manager, configuring43-13
traps
differences from informs43-5
enabling43-11
enabling MAC address notification4-22
enabling MAC move notification4-24
enabling MAC threshold notification4-26
types of43-11
versions supported43-2
SNMP commands48-16
SNMPv143-2
SNMPv2C43-2
SNMPv343-2
software
upgrading8-13
software configuration register3-26
software switching
description26-5
interfaces26-6
key data structures used27-7
SPAN
and ACLs41-5
configuration guidelines41-7
destination ports41-5
IDS41-2
monitored port, defined41-4
monitoring port, defined41-5
received traffic41-3
sessions
defined41-3
source ports41-4
transmitted traffic41-4
VLAN-based41-5
SPAN and RSPAN
concepts and terminology41-3
default configuration41-6
displaying status41-25
overview41-1
session limits41-6
SPAN enhancements
access list filtering41-13
configuration example41-15
CPU port sniffing41-10
encapsulation configuration41-12
ingress packets41-12
packet type filtering41-15
spanning-tree backbonefast command18-15
spanning-tree cost command17-15
spanning-tree guard root command18-2
spanning-tree portfast bpdu-guard command18-7
spanning-tree portfast command18-6
spanning-tree port-priority command17-13
spanning-tree uplinkfast command18-11
spanning-tree vlan
command17-9
command example17-9
spanning-tree vlan command17-8
spanning-tree vlan cost command17-15
spanning-tree vlan forward-time command17-19
spanning-tree vlan hello-time command17-17
spanning-tree vlan max-age command17-18
spanning-tree vlan port-priority command17-13
spanning-tree vlan priority command17-17
spanning-tree vlan root primary command17-10
spanning-tree vlan root secondary command17-12
speed
configuring interface6-8
speed command6-8
SSO
configuring9-10
SSO operation9-4
SST
description17-22
interoperability17-24
static addresses
static routes
configuring3-11
verifying3-12
statistics
displaying 802.1X32-43
displaying PIM27-20
NetFlow accounting44-9
SNMP input and output43-16
sticky learning
configuration file33-5
defined33-5
disabling33-5
enabling33-5
saving addresses33-5
sticky MAC addresses
configuring33-7
defined33-4
Storm Control
disabling40-4
displaying40-5
enabling40-3
hardware-based, implementing40-2
overview40-1
STP
bridge ID17-2
creating topology17-4
defaults17-6
disabling17-19
enabling17-7
enabling extended system ID17-8
enabling Per-VLAN Rapid Spanning Tree17-20
forward-delay time17-18
hello time17-17
Layer 2 protocol tunneling21-7
maximum aging time17-18
per-VLAN rapid spanning tree17-6
port cost17-15
port priority17-13
root bridge17-9
stratum, NTP4-2
stub routing (EIGRP)
benefits25-10
configuration tasks25-10
configuring25-6
overview25-6
restrictions25-10
verifying25-11
subdomains, private VLAN38-2
summer time4-13
supervisor engine
accessing the redundant8-14
copying files to standby8-14
default configuration3-1
default gateways3-11
environmental monitoring10-1
redundancy9-1
ROM monitor3-25
startup configuration3-25
static routes3-11
synchronizing configurations8-11
Supervisor Engine II-TS
insufficient inline power handling10-15, 11-12
SVIs
and router ACLs37-3
switched packets
and ACLs37-21
Switched Port Analyzer
switching, NetFlow
checking for required hardware44-6
configuration (example)44-13
configuring switched IP flows44-8
enabling Collection44-7
exporting cache entries44-9
switchport
switchport access vlan command15-6, 15-8
switchport block multicast command39-2
switchport block unicast command39-2
switchport mode access command15-8
switchport mode dot1q-tunnel command21-6
switchport mode dynamic command15-6
switchport mode trunk command15-6
switch ports
switchport trunk allowed vlan command15-6
switchport trunk encapsulation command15-6
switchport trunk encapsulation dot1q command15-3
switchport trunk encapsulation isl command15-3
switchport trunk encapsulation negotiate command15-3
switchport trunk native vlan command15-6
switchport trunk pruning vlan command15-6
switch-to-RADIUS server communication
configuring32-24
syslog
syslog messages10-2
sysret command50-5
system
reviewing configuration3-10
settings at startup3-27
system clock
configuring
daylight saving time4-13
manually4-11
summer time4-13
time zones4-12
displaying the time and date4-12
overview4-2
system images
loading from Flash memory3-30
modifying boot field3-27
specifying3-29
system message logging
default configuration42-3
defining error message severity levels42-8
disabling42-4
displaying the configuration42-12
enabling42-4
facility keywords, described42-12
level keywords, described42-8
limiting messages42-9
message format42-2
overview42-1
sequence numbers, enabling and disabling42-7
setting the display destination device42-4
synchronizing log messages42-5
timestamps, enabling and disabling42-7
UNIX syslog servers
configuring the daemon42-10
configuring the logging facility42-11
facilities supported42-12
system MTU
802.1Q tunneling21-5
maximums21-5
system name
default configuration4-15
default setting4-15
manual configuration4-15
system prompt, default setting4-14, 4-15
T
TACACS+34-1
accounting, defined3-16
authentication, defined3-16
authorization, defined3-16
configuring
accounting3-21
authentication key3-18
authorization3-21
login authentication3-19
default configuration3-18
displaying the configuration3-22
identifying the server3-18
limiting the services to the user3-21
operation of3-17
overview3-15
tracking services accessed by user3-21
tagged packets
802.1Q21-3
Layer 2 protocol21-7
TCAM programming and ACLs37-6
TCAMs, troubleshooting49-4
TDR
checking cable connectivity7-3
enabling and disabling test7-3
guidelines7-3
Telnet
accessing CLI2-2
disconnecting user sessions7-6
executing7-5
monitoring user sessions7-6
telnet command7-5
Terminal Access Controller Access Control System Plus
TFTP
configuration files in base directory3-4
configuring for autoconfiguration3-4
limiting access by servers43-15
TFTP download
time
Time Domain Reflectometer
time exceeded messages7-8
timer
timestamps in log messages42-7
time zones4-12
Token Ring
media not supported (note)13-4, 13-10
TOS
description30-4
trace command7-9
traceroute
traceroute mac command7-10
traceroute mac ip command7-10
traffic
blocking flooded39-2
traffic control
using ACLs (figure)37-4
using VLAN maps (figure)37-5
traffic shaping30-15
translational bridge numbers (defaults)13-4
transmit queues
transmit rate30-53
traps
configuring MAC address notification4-22
configuring MAC move notification4-24
configuring MAC threshold notification4-26
configuring managers43-11
defined43-3
enabling4-22, 4-24, 4-26, 43-11
notification types43-11
troubleshooting
ACLs49-1
high CPU49-8
IP multicast
overview49-9
PIM and IGMP protocols49-9
topology and configuration49-10
IP unicast49-18
sharing adjacencies49-20
verifying a router's MAC address49-24
TCAMs
ACL optimization49-5
Layer 4 operators49-6
overview49-4
static49-7
structure of the input and output CAMs49-4
tracking supervisor engine resets through PeerResetReason variable49-24
with CiscoWorks43-4
with system message logging42-1
with traceroute7-8
trunk ports
configure port security33-16
configuring PVLAN38-17to 38-18
trunks
802.1Q restrictions15-5
configuring15-6
configuring access VLANs15-6
configuring allowed VLANs15-6
default interface configuration15-6
different VTP domains15-3
enabling to non-DTP device15-4
encapsulation15-3
specifying native VLAN15-6
understanding15-3
trusted boundary for QoS30-26
trust states
configuring30-49
tunneling
defined21-1
tunnel ports
802.1Q, configuring21-6
described21-2
incompatibilities with other features21-5
type of service
U
UDLD
default configuration23-2
disabling23-3
enabling23-3
overview23-1
unauthorized ports with 802.1X32-4
unicast
unicast flood blocking
configuring39-1
unicast MAC address filtering
and adding static addresses4-29
and broadcast MAC addresses4-28
and CPU packets4-28
and multicast addresses4-28
and router MAC addresses4-28
configuration guidelines4-28
described4-28
unicast traffic
blocking39-2
unidirectional ethernet
enabling24-2
example of setting24-2
overview24-1
UniDirectional Link Detection Protocol
UNIX syslog servers
daemon configuration42-10
facilities supported42-12
message logging configuration42-11
UplinkFast
and MST17-23
enabling18-15
MST and17-23
overview18-10
User Based Rate Limiting
configuring30-39
overview30-39
user EXEC mode2-5
user sessions
disconnecting7-6
monitoring7-6
V
VACLs
Layer 4 port operations37-9
virtual configuration register50-3
virtual LANs
Virtual Private Network
VLAN ACLs
vlan database command13-7
vlan dot1q tag native command21-4
VLAN ID, discovering4-30
VLAN Management Policy Server
VLAN maps
common uses for37-18
configuration example37-18
configuration guidelines37-14
configuring37-13
creating entries37-15
defined37-3
denying access example37-19
denying packets37-15
displaying37-20
examples37-19
order of entries37-14
permitting packets37-15
router ACLs and37-21
using (figure)37-5
VLANs
allowed on trunk15-6
configuration guidelines13-3
configuring13-4
customer numbering in service-provider networks21-3
default configuration13-4
description1-5
extended range13-3
IDs (default)13-4
interface assignment13-8
limiting source traffic with RSPAN41-23
monitoring with RSPAN41-22
name (default)13-4
normal range13-3
overview13-1
reserved range13-3
VLAN Trunking Protocol
VLAN trunks
overview15-3
VMPS
configuration file example13-29
configuring dynamic access ports on client13-22
configuring retry interval13-24
database configuration file13-29
dynamic port membership
example13-26
reconfirming13-23
reconfirming assignments13-23
reconfirming membership interval13-23
server overview13-17
VMPS client
administering and monitoring13-24
configure switch
configure reconfirmation interval13-23
dynamic ports13-22
entering IP VMPS address13-21
reconfirmation interval13-24
reconfirm VLAM membership13-23
default configuration13-21
dynamic VLAN membership overview13-20
troubleshooting dynamic port VLAN membership13-25
VMPS server
fall-back VLAN13-19
illegal VMPS client requests13-20
overview13-17
security modes
multiple13-19
open13-18
secure13-19
voice interfaces
configuring31-1
Voice over IP
configuring31-1
voice ports
configuring VVID31-3
voice VLAN
IP phone data traffic, described31-2
IP phone voice traffic, described31-2
voice VLAN ports
using 802.1X32-18
VPN
configuring routing in29-6
forwarding29-4
in service provider networks29-1
routes29-2
routing and forwarding table
VRF
defining29-4
tables29-1
VTP
configuration guidelines13-12
configuring transparent mode13-16
default configuration13-12
disabling13-16
Layer 2 protocol tunneling21-7
monitoring13-16
overview13-8
VTP advertisements
description13-9
VTP clients
configuring13-15
VTP domains
description13-9
VTP modes13-9
VTP pruning
enabling13-13
overview13-10
VTP servers
configuring13-14
VTP statistics
displaying13-16
VTP version 2
enabling13-14
overview13-10
VTY and Network Assistant12-11
VVID (voice VLAN ID)
and 802.1X authentication32-18
configuring31-3
W
Wake-on-LAN
configure with 802.1X32-34
WCCP
configuration examples47-8
configuring on a router47-2, 47-10
features47-4
restrictions47-5
service groups47-6
Web Cache Communication Protocol
web caches
web cache services
description47-4
web caching
web scaling47-1