Preface
This preface describes who should read this document, how it is organized, and its conventions. The preface also tells you how to obtain Cisco documents, as well as how to obtain technical assistance.
Audience
This guide is for experienced network administrators who are responsible for configuring and maintaining Catalyst 4500 series switches.
Organization
This guide is organized into the following chapters:
|
|
|
Chapter 1 |
Product Overview |
Presents an overview of the Cisco IOS software for the Catalyst 4500 series switches |
Chapter 2 |
Command-Line Interfaces |
Describes how to use the CLI |
Chapter 3 |
Configuring the Switch for the First Time |
Describes how to perform a baseline configuration of the switch |
Chapter 4 |
Administering the Switch |
Describes how to administer the switch. |
Chapter 5 |
Configuring the Cisco IOS In Service Software Upgrade Process |
Describes how to configure ISSU on the switch. |
Chapter 6 |
Configuring Interfaces |
Describes how to configure non-layer-specific features on Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet interfaces |
Chapter 7 |
Checking Port Status and Connectivity |
Describes how to check module and interface status |
Chapter 8 |
Configuring Supervisor Engine Redundancy Using RPR and SSO |
Describes how to configure RPR and SSO on the Catalyst 4507R and 4510R switches |
Chapter 9 |
Configuring Cisco NSF with SSO Supervisor Engine Redundancy |
Describes how to configure supervisor engine redundancy using Cisco nonstop forwarding (NSF) with stateful switchover (SSO). |
Chapter 10 |
Environmental Monitoring and Power Management |
Describes how to configure power management and environmental monitoring features |
Chapter 11 |
Configuring Power over Ethernet |
Describes how to configure Power over Ethernet (PoE) |
Chapter 12 |
Configuring the Catalyst 4500 Series Switch with Cisco Network Assistant |
Describes how to install and configure Network Assistant and Embedded CiscoView |
Chapter 13 |
Configuring VLANs, VTP, and VMPS |
Describes how to configure VLANs, VTP, and VMPS. |
Chapter 14 |
Configuring IP Unnumbered Interface |
Describes how to configure IP Unnumbered support. |
Chapter 15 |
Configuring Layer 2 Ethernet Interfaces |
Describes how to configure interfaces to support Layer 2 features, including VLAN trunks |
Chapter 16 |
Configuring SmartPort Macros |
Describes how to configure SmartPort macros |
Chapter 17 |
Configuring STP and MST |
Describes how to configure the Spanning Tree Protocol (STP) and the Multiple Spanning Tree (MST) protocol and explains how they work. |
Chapter 18 |
Configuring Resilient Ethernet Protocol |
Describes how to configure Resilient Ethernet Protocol (REP). |
Chapter 19 |
Configuring Optional STP Features |
Describes how to configure the spanning-tree PortFast, UplinkFast, BackboneFast, and other STP features |
Chapter 20 |
Configuring EtherChannel |
Describes how to configure Layer 2 and Layer 3 EtherChannel port bundles |
Chapter 21 |
Configuring IGMP Snooping and Filtering |
Describes how to configure Internet Group Management Protocol (IGMP) snooping |
Chapter 22 |
Configuring IPv6 MLD Snooping |
Describes how to configure IPv6 MLD Snooping. |
Chapter 23 |
Configuring 802.1Q and Layer 2 Protocol Tunneling |
Describes how to configure 802.1Q and Layer 2 protocol Tunneling |
Chapter 24 |
Configuring CDP |
Describes how to configure the Cisco Discovery Protocol (CDP) |
Chapter 25 |
Configuring LLDP and LLDP-MED |
Describes how to configure Link Layer Discovery Protocol (LLDP). |
Chapter 26 |
Configuring UDLD |
Describes how to configure the UniDirectional Link Detection (UDLD) protocol |
Chapter 31 |
Configuring Unidirectional Ethernet |
Describes how to configure unidirectional Ethernet |
Chapter 27 |
Configuring Layer 3 Interfaces |
Describes how to configure interfaces to support Layer 3 features |
Chapter 28 |
Configuring Cisco Express Forwarding |
Describes how to configure Cisco Express Forwarding (CEF) for IP unicast traffic |
Chapter 29 |
Configuring Unicast Reverse Path Forwarding |
Describes how to configure Unicast Reverse Path Forwarding. |
Chapter 32 |
Configuring IP Multicast |
Describes how to configure IP Multicast Multilayer Switching (MMLS) |
Chapter 33 |
Configuring Policy-Based Routing |
Describes how to configure policy-based routing |
Chapter 34 |
Configuring VRF-lite |
Describes how to configure multiple VPN routing/forwarding (multi-VRF) instances in customer edge (CE) devices |
Chapter 35 |
Configuring Quality of Service |
Describes how to configure quality of service (QoS) |
Chapter 36 |
Configuring Voice Interfaces |
Describes how to configure voice interfaces |
Chapter 36 |
Configuring Private VLANs |
Describes how to set up and modify private VLANs |
Chapter 37 |
Configuring 802.1X Port-Based Authentication |
Describes how to configure 802.1X port-based authentication |
Chapter 38 |
Configuring Port Security |
Describes how to configure port security and trunk port security |
Chapter 1 |
Configuring Control Plane Policing |
Describes how to protect your Catalyst 4500 series switch using control plane policing (CoPP) |
Chapter 39 |
Configuring DHCP Snooping, IP Source Guard, and IPSG for Static Hosts |
Describes how to configure DHCP snooping and IP Source Guard |
Chapter 41 |
Configuring Dynamic ARP Inspection |
Describes how to configure Dynamic ARP Inspection |
Chapter 42 |
Configuring Network Security with ACLs |
Describes how to configure ACLS, VACLs, and MACLs |
Chapter 43 |
Port Unicast and Multicast Flood Blocking |
Describes how to configure unicast flood blocking |
Chapter 44 |
Configuring Storm Control |
Describes how to configure storm control suppression |
Chapter 45 |
Configuring SPAN and RSPAN |
Describes how to configure the Switched Port Analyzer (SPAN) |
Chapter 46 |
Configuring System Message Logging |
Describes how to configure system message logging. |
Chapter 47 |
Configuring SNMP |
Describes how to configure the Simple Network Management Protocol (SNMP). |
Chapter 48 |
Configuring NetFlow |
Describes how to configure NetFlow statistics gathering |
Chapter 50 |
Configuring RMON |
Describes how to configure Remote Network Monitoring (RMON). |
Chapter 51 |
Performing Diagnostics |
Describes vaious types of diagnostics on the Catalyst 4500 series switch. |
Chapter 52 |
Configuring WCCP Version 2 Services |
Describes how to configure the Catalyst 4500 series switches to redirect traffic to cache engines (web caches) using the Web Cache Communication Protocol (WCCP), and describes how to manage cache engine clusters (cache farms). |
Chapter 53 |
Configuring MIB Support |
Describes how to configure configure SNMP and MIB support. |
Chapter 54 |
ROM Monitor |
Describes the ROM Monitor. |
Appendix A |
Acronyms and Abbreviations |
Defines acronyms and abbreviations used in this book |
Related Documentation
Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900, Catalyst ME 4900, and Catalyst 4900M) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide. Refer to the following home pages for additional information:
•Catalyst 4500 Series Switch Documentation Home
http://www.cisco.com/go/cat4500/docs
•Catalyst 4900 Series Switch Documentation Home
http://www.cisco.com/go/cat4900/docs
•Cisco ME 4900 Series Ethernet Switches Documentation Home
http://www.cisco.com/en/US/products/ps7009/tsd_products_support_series_home.html
Hardware Documents
Installation guides and notes including specifications and relevant safety information are available at the following URLs:
•Catalyst 4500 Series Switches Installation Guide
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html
•Catalyst 4500 E-series Switches Installation Guide
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html
•For information about individual switching modules and supervisors, refer to the Catalyst 4500 Series Module Installation Guide at:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/module/guide/mod_inst.html
•Regulatory Compliance and Safety Information for the Catalyst 4500 Series Switches
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html
•Installation notes for specific supervisor engines or for accessory hardware are available at:
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
•Catalyst 4900 and 4900M hardware installation information is available at:
http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html
•Cisco ME 4900 Series Ethernet Switches installation information is available at:
http://www.cisco.com/en/US/products/ps7009/prod_installation_guides_list.html
Software Documentation
Software release notes, configuration guides, command references, and system message guides are available at the following URLs:
•Catalyst 4500 release notes are available at:
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html
•Catalyst 4900 release notes are available at:
http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html
•Cisco ME4900 4900 Series Ethernet Switch release notes are available at:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_11511.html
Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900, and
Cisco ME 4900 Series Ethernet Switches are available at the following URLs:
•Catalyst 4500 Series Software Configuration Guide
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html
•Catalyst 4500 Series Software Command Reference
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html
•Catalyst 4500 Series Software System Message Guide
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html
Cisco IOS Documentation
Platform-independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:
•Cisco IOS configuration guides, Release 12.x
http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html
•Cisco IOS command references, Release 12.x
http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html
You can also use the Command Lookup Tool at:
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do
•Cisco IOS system messages, version 12.x
http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html
You can also use the Error Message Decoder tool at:
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
•For information about MIBs, refer to:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
Conventions
This document uses the following typographical conventions:
|
|
boldface font |
Commands, command options, and keywords are in boldface. |
italic font |
Command arguments for which you supply values are in italics. |
[ ] |
Command elements in square brackets are optional. |
{ x | y | z } |
Alternative keywords in command lines are grouped in braces and separated by vertical bars. |
[ x | y | z ] |
Optional alternative keywords are grouped in brackets and separated by vertical bars. |
string |
A nonquoted set of characters. Do not use quotation marks around the string because the string will include the quotation marks. |
screen font |
System displays are in screen font. |
boldface screen font |
Information you must enter verbatim is in boldface screen font. |
italic screen font |
Arguments for which you supply values are in italic screen font. |
|
This pointer highlights an important line of text in an example. |
^ |
Represents the key labeled Control—for example, the key combination ^D in a screen display means hold down the Control key while you press the D key. |
< > |
Nonprinting characters such as passwords are in angle brackets. |
Notes use the following conventions:
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.
Cautions use the following conventions:
Caution
Means
reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.
Commands in Task Tables
Commands listed in task tables show only the relevant information for completing the task and not all available options for the command. For a complete description of a command, refer to the command in the Catalyst 4500 Series Switch Cisco IOS Command Reference.
Notices
The following notices pertain to this software license.
OpenSSL/Open SSL Project
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
License Issues
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
OpenSSL License:
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)".
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)".
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS"' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Original SSLeay License:
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)".
The word `cryptographic' can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)".
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html