A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

A

AAA down policy, NAC Layer 2 IP validation 1-10

abbreviating commands 2-3

ABRs 41-24

AC (command switch) 6-10

access-class command 38-19

access control entries

See ACEs

access control entry (ACE) 44-3

access-denied response, VMPS 16-25

access groups

applying IPv4 ACLs to interfaces 38-20

Layer 2 38-20

Layer 3 38-20

accessing

clusters, switch 6-13

command switches 6-11

member switches 6-13

switch clusters 6-13

access lists

See ACLs

access ports

and Layer 2 protocol tunneling 20-10

defined 14-3

in switch clusters 6-9

accounting

with 802.1x 12-50

with IEEE 802.1x 12-14

with RADIUS 11-33

with TACACS+ 11-11, 11-17

ACEs

and QoS 39-8

defined 38-2

Ethernet 38-2

IP 38-2

ACLs

ACEs 38-2

any keyword 38-12

applying

on bridged packets 38-38

on multicast packets 38-40

on routed packets 38-39

on switched packets 38-38

time ranges to 38-16

to an interface 38-19, 44-7

to IPv6 interfaces 44-7

to QoS 39-8

classifying traffic for QoS 39-45

comments in 38-18

compiling 38-22

defined 38-1, 38-7

examples of 38-22, 39-45

extended IP, configuring for QoS classification 39-46

extended IPv4

creating 38-10

matching criteria 38-7

hardware and software handling 38-21

host keyword 38-12

IP

creating 38-7

fragments and QoS guidelines 39-35

implicit deny 38-9, 38-14, 38-15

implicit masks 38-9

matching criteria 38-7

undefined 38-20

IPv4

applying to interfaces 38-19

creating 38-7

matching criteria 38-7

named 38-14

numbers 38-8

terminal lines, setting on 38-19

unsupported features 38-7

IPv6

applying to interfaces 44-7

configuring 44-3, 44-4

displaying 44-8

interactions with other features 44-4

limitations 44-2, 44-3

matching criteria 44-3

named 44-2

precedence of 44-2

supported 44-2

unsupported features 44-3

Layer 4 information in 38-37

logging messages 38-8

MAC extended 38-27, 39-47

matching 38-7, 38-20, 44-3

monitoring 38-41, 44-8

named, IPv4 38-14

named, IPv6 44-2

names 44-4

number per QoS class map 39-35

port 38-2, 44-1

precedence of 38-2

QoS 39-8, 39-45

resequencing entries 38-14

router 38-2, 44-1

router ACLs and VLAN map configuration guidelines 38-37

standard IP, configuring for QoS classification 39-45

standard IPv4

creating 38-9

matching criteria 38-7

support for 1-9

support in hardware 38-21

time ranges 38-16

types supported 38-2

unsupported features, IPv4 38-7

unsupported features, IPv6 44-3

using router ACLs with VLAN maps 38-36

VLAN maps

configuration guidelines 38-30

configuring 38-29

active link 25-4, 25-5, 25-6

active links 25-2

active router 45-1

active traffic monitoring, IP SLAs 46-1

address aliasing 28-2

addresses

displaying the MAC address table 7-30

dynamic

accelerated aging 21-8

changing the aging time 7-21

default aging 21-8

defined 7-19

learning 7-20

removing 7-22

IPv6 42-2

MAC, discovering 7-30

multicast

group address range 49-3

STP address management 21-8

static

adding and removing 7-26

defined 7-19

address resolution 7-30, 41-8

Address Resolution Protocol

See ARP

adjacency tables, with CEF 41-86

administrative distances

defined 41-98

OSPF 41-30

routing protocol defaults 41-88

administrative VLAN

REP, configuring 24-8

administrative VLAN, REP 24-8

advertisements

CDP 32-1

LLDP 31-1, 31-2

RIP 41-18

VTP 16-16, 17-3, 17-4

age timer, REP 24-8

aggregatable global unicast addresses 42-3

aggregate addresses, BGP 41-57

aggregated ports

See EtherChannel

aggregate policers 39-61

aggregate policing 1-12

aging, accelerating 21-8

aging time

accelerated

for MSTP 22-24

for STP 21-8, 21-21

MAC address table 7-21

maximum

for MSTP 22-25

for STP 21-21, 21-22

alarm profiles

configuring 3-10

creating or modifying 3-9

alarms

default configuration 3-4

displaying 3-12

power supply 3-2

temperature 3-2

alarms, RMON 34-4

allowed-VLAN list 16-19

application engines, redirecting traffic to 48-1

area border routers

See ABRs

area routing

IS-IS 41-61

ISO IGRP 41-61

ARP

configuring 41-9

defined 1-5, 7-30, 41-8

encapsulation 41-9

static cache configuration 41-9

table

address resolution 7-30

managing 7-30

ASBRs 41-24

AS-path filters, BGP 41-51

associating the temperature alarms to a relay 3-7

asymmetrical links, and IEEE 802.1Q tunneling 20-4

attaching an alarm profile to a port 3-10

attributes, RADIUS

vendor-proprietary 11-36

vendor-specific 11-34

attribute-value pairs 12-12, 12-15, 12-20

authentication

EIGRP 41-37

HSRP 45-10

local mode with AAA 11-42

NTP associations 7-4

open1x 12-29

RADIUS

key 11-26

login 11-28

TACACS+

defined 11-11

key 11-13

login 11-14

See also port-based authentication

authentication compatibility with Catalyst 6000 switches 12-8

authentication failed VLAN

See restricted VLAN

authentication keys, and routing protocols 41-98

authentication manager

CLI commands 12-9

compatibility with older 802.1x CLI commands12-9to ??

overview 12-7

authoritative time source, described 7-2

authorization

with RADIUS 11-32

with TACACS+ 11-11, 11-16

authorized ports with IEEE 802.1x 12-10

autoconfiguration 4-3

auto enablement 12-30

automatic discovery

considerations

beyond a noncandidate device 6-7

brand new switches 6-9

connectivity 6-4

different VLANs 6-6

management VLANs 6-7

non-CDP-capable devices 6-6

noncluster-capable devices 6-6

routed ports 6-8

in switch clusters 6-4

See also CDP

automatic QoS

See QoS

automatic recovery, clusters 6-10

See also HSRP

auto-MDIX

configuring 14-19

described 14-19

autonegotiation

duplex mode 1-3

interface configuration guidelines 14-16

mismatches 52-7

autonomous system boundary routers

See ASBRs

autonomous systems, in BGP 41-45

Auto-QoS video devices 1-12

Auto-RP, described 49-6

autosensing, port speed 1-3

Auto Smartports macros

displaying 15-5

autostate exclude 14-5

auxiliary VLAN

See voice VLAN

availability, features 1-7

B

BackboneFast

described 23-5

disabling 23-14

enabling 23-13

support for 1-7

backup interfaces

See Flex Links

backup links 25-2

backup static routing, configuring 47-12

banners

configuring

login 7-19

message-of-the-day login 7-18

default configuration 7-17

when displayed 7-17

Berkeley r-tools replacement 11-54

BGP

aggregate addresses 41-57

aggregate routes, configuring 41-57

CIDR 41-57

clear commands 41-60

community filtering 41-54

configuring neighbors 41-55

default configuration 41-42

described 41-41

enabling 41-45

monitoring 41-60

multipath support 41-49

neighbors, types of 41-45

path selection 41-49

peers, configuring 41-55

prefix filtering 41-53

resetting sessions 41-48

route dampening 41-59

route maps 41-51

route reflectors 41-58

routing domain confederation 41-58

routing session with multi-VRF CE 41-80

show commands 41-60

supernets 41-57

support for 1-13

Version 4 41-42

binding cluster group and HSRP group 45-12

binding database

address, DHCP server

See DHCP, Cisco IOS server database

DHCP snooping

See DHCP snooping binding database

bindings

address, Cisco IOS DHCP server 26-6

DHCP snooping database 26-6

IP source guard 26-15

binding table, DHCP snooping

See DHCP snooping binding database

blocking packets 29-7

Boolean expressions in tracked lists 47-4

booting

boot loader, function of 4-2

boot process 4-1

manually 4-19

specific image 4-20

boot loader

accessing 4-21

described 4-2

environment variables 4-21

prompt 4-21

trap-door mechanism 4-2

bootstrap router (BSR), described 49-7

Border Gateway Protocol

See BGP

BPDU

error-disabled state 23-2

filtering 23-3

RSTP format 22-12

BPDU filtering

described 23-3

disabling 23-12

enabling 23-12

support for 1-7

BPDU guard

described 23-2

disabling 23-12

enabling 23-11

support for 1-7

bridged packets, ACLs on 38-38

bridge groups

See fallback bridging

bridge protocol data unit

See BPDU

broadcast flooding 41-16

broadcast packets

directed 41-13

flooded 41-13

broadcast storm-control command 29-4

broadcast storms 29-1, 41-13

C

cables, monitoring for unidirectional links 33-1

candidate switch

automatic discovery 6-4

defined 6-3

requirements 6-3

See also command switch, cluster standby group, and member switch

Catalyst 6000 switches

authentication compatibility 12-8

CA trustpoint

configuring 11-50

defined 11-48

CDP

and trusted boundary 39-41

automatic discovery in switch clusters 6-4

configuring 32-2

default configuration 32-2

defined with LLDP 31-1

described 32-1

disabling for routing device32-3to 32-4

enabling and disabling

on an interface 32-4

on a switch 32-3

Layer 2 protocol tunneling 20-7

monitoring 32-5

overview 32-1

support for 1-5

transmission timer and holdtime, setting 32-2

updates 32-2

CEF

defined 41-85

enabling 41-86

IPv6 42-18

CGMP

as IGMP snooping learning method 28-8

clearing cached group entries 49-61

enabling server support 49-43

joining multicast group 28-3

overview 49-9

server support only 49-9

switch support of 1-3

CIDR 41-57

CipherSuites 11-49

Cisco 7960 IP Phone 18-1

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco IOS DHCP server

See DHCP, Cisco IOS DHCP server

Cisco IOS File System

See IFS

Cisco IOS IP SLAs 46-1

Cisco Secure ACS

attribute-value pairs for downloadable ACLs 12-20

attribute-value pairs for redirect URL 12-20

Cisco Secure ACS configuration guide 12-61

CiscoWorks 2000 1-4, 36-4

CISP 12-30

CIST regional root

See MSTP

CIST root

See MSTP

civic location 31-3

classless interdomain routing

See CIDR

classless routing 41-6

class maps for QoS

configuring 39-48

described 39-8

displaying 39-82

class of service

See CoS

clearing interfaces 14-25

CLI

abbreviating commands 2-3

command modes 2-1

configuration logging 2-4

described 1-4

editing features

enabling and disabling 2-6

keystroke editing 2-6

wrapped lines 2-8

error messages 2-4

filtering command output 2-9

getting help 2-3

history

changing the buffer size 2-5

described 2-5

disabling 2-6

recalling commands 2-5

managing clusters 6-14

no and default forms of commands 2-4

Client Information Signalling Protocol

See CISP

client mode, VTP 17-3

client processes, tracking 47-1

CLNS

See ISO CLNS

clock

See system clock

clusters, switch

accessing 6-13

automatic discovery 6-4

automatic recovery 6-10

benefits 1-2

compatibility 6-4

described 6-1

LRE profile considerations 6-14

managing

through CLI 6-14

through SNMP 6-15

planning 6-4

planning considerations

automatic discovery 6-4

automatic recovery 6-10

CLI 6-14

host names 6-13

IP addresses 6-13

LRE profiles 6-14

passwords 6-13

RADIUS 6-14

SNMP 6-14, 6-15

TACACS+ 6-14

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

cluster standby group

and HSRP group 45-12

automatic recovery 6-12

considerations 6-11

defined 6-2

requirements 6-3

virtual IP address 6-11

See also HSRP

CNS 1-5

Configuration Engine

configID, deviceID, hostname 5-3

configuration service 5-2

described 5-1

event service 5-3

embedded agents

described 5-5

enabling automated configuration 5-6

enabling configuration agent 5-9

enabling event agent 5-7

management functions 1-4

CoA Request Commands 11-23

command-line interface

See CLI

command modes 2-1

commands

abbreviating 2-3

no and default 2-4

commands, setting privilege levels 11-8

command switch

accessing 6-11

active (AC) 6-10

configuration conflicts 52-7

defined 6-2

passive (PC) 6-10

password privilege levels 6-15

priority 6-10

recovery

from command-switch failure 6-10, 52-4

from lost member connectivity 52-7

redundant 6-10

replacing

with another switch 52-6

with cluster member 52-4

requirements 6-3

standby (SC) 6-10

See also candidate switch, cluster standby group, member switch, and standby command switch

community list, BGP 41-54

community ports 19-2

community strings

configuring 6-14, 36-8

for cluster switches 36-4

in clusters 6-14

overview 36-4

SNMP 6-14

community VLANs 19-2, 19-3

compatibility, feature 29-12

config.text 4-18

configurable leave timer, IGMP 28-6

configuration, initial

defaults 1-14

Express Setup 1-2

configuration changes, logging 35-10

configuration conflicts, recovering from lost member connectivity 52-7

configuration examples, network 1-17

configuration files

archiving B-21

clearing the startup configuration B-20

creating using a text editor B-11

default name 4-18

deleting a stored configuration B-20

described B-9

downloading

automatically 4-19

preparing B-11, B-14, B-17

reasons for B-9

using FTP B-14

using RCP B-18

using TFTP B-12

guidelines for creating and using B-10

guidelines for replacing and rolling back B-22

invalid combinations when copying B-5

limiting TFTP server access 36-16

obtaining with DHCP 4-9

password recovery disable considerations 11-5

replacing a running configuration B-20, B-21

rolling back a running configuration B-20, B-22

specifying the filename 4-19

system contact and location information 36-16

types and location B-10

uploading

preparing B-11, B-14, B-17

reasons for B-9

using FTP B-16

using RCP B-19

using TFTP B-13

configuration guidelines

REP 24-7

configuration guidelines, multi-VRF CE 41-74

configuration logger 35-10

configuration logging 2-4

configuration replacement B-20

configuration rollback B-20, B-21

configuration settings, saving 4-16

configure terminal command 14-8

configuring 802.1x user distribution 12-57

configuring port-based authentication violation modes12-39to 12-40

configuring small-frame arrival rate 29-5

conflicts, configuration 52-7

connections, secure remote 11-44

connectivity problems 52-8, 52-10, 52-11

consistency checks in VTP Version 2 17-4

console port, connecting to 2-9

content-routing technology

See WCCP

control protocol, IP SLAs 46-4

convergence

REP 24-4

corrupted software, recovery steps with Xmodem 52-2

CoS

in Layer 2 frames 39-2

override priority 18-6

trust priority 18-6

CoS input queue threshold map for QoS 39-17

CoS output queue threshold map for QoS 39-19

CoS-to-DSCP map for QoS 39-64

counters, clearing interface 14-25

CPU utilization, troubleshooting 52-19

crashinfo file 52-18

critical authentication, IEEE 802.1x 12-54

critical VLAN 12-23

cryptographic software image

Kerberos 11-38

SSH 11-43

SSL 11-47

customer edge devices 41-72

customjzeable web pages, web-based authentication 13-6

D

DACL

See downloadable ACL

daylight saving time 7-13

debugging

enabling all system diagnostics 52-15

enabling for a specific feature 52-15

redirecting error message output 52-15

using commands 52-14

default alarm configuration 3-4

default commands 2-4

default configuration

802.1x 12-33

auto-QoS 39-21

banners 7-17

BGP 41-42

CDP 32-2

DHCP 26-8

DHCP option 82 26-8

DHCP snooping 26-8

DHCP snooping binding database 26-8

DNS 7-16

dynamic ARP inspection 27-5

EIGRP 41-34

EtherChannel 40-10

Ethernet interfaces 14-13

fallback bridging 51-3

Flex Links 25-8

HSRP 45-5

IEEE 802.1Q tunneling 20-4

IGMP 49-38

IGMP filtering 28-24

IGMP snooping 28-7, 43-5, 43-6

IGMP throttling 28-24

initial switch information 4-3

IP addressing, IP routing 41-4

IP multicast routing 49-10

IP SLAs 46-6

IP source guard 26-17

IPv6 42-10

IS-IS 41-63

Layer 2 interfaces 14-13

Layer 2 protocol tunneling 20-11

LLDP 31-4

MAC address table 7-21

MAC address-table move update 25-8

MSDP 50-4

MSTP 22-15

multi-VRF CE 41-73

MVR 28-19

NTP 7-4

optional spanning-tree configuration 23-9

OSPF 41-25

password and privilege level 11-2

PIM 49-10

private VLANs 19-6

PROFINET 9-4

PTP 8-2

RADIUS 11-25

REP 24-7

RIP 41-19

RMON 34-3

RSPAN 30-9

SDM template 10-3

SNMP 36-6

SPAN 30-9

SSL 11-50

standard QoS 39-33

STP 21-11

system message logging 35-3

system name and prompt 7-15

TACACS+ 11-13

UDLD 33-4

VLAN, Layer 2 Ethernet interfaces 16-16

VLANs 16-7

VMPS 16-26

voice VLAN 18-3

VTP 17-7

WCCP 48-5

default gateway 4-16, 41-11

default networks 41-89

default router preference

See DRP

default routes 41-88

default routing 41-2

default web-based authentication configuration

802.1X 13-9

deleting VLANs 16-9

denial-of-service attack 29-1

description command 14-20

designing your network, examples 1-17

destination addresses

in IPv4 ACLs 38-11

in IPv6 ACLs 44-5

destination-IP address-based forwarding, EtherChannel 40-8

destination-MAC address forwarding, EtherChannel 40-8

detecting indirect link failures, STP 23-5

device B-25

device discovery protocol 31-1, 32-1

device manager

benefits 1-2

described 1-2, 1-4

in-band management 1-6

upgrading a switch B-25

DHCP

Cisco IOS server database

configuring 26-13

default configuration 26-8

described 26-6

DHCP for IPv6

See DHCPv6

enabling

relay agent 26-10

DHCP-based autoconfiguration

client request message exchange 4-4

configuring

client side 4-3

DNS 4-7

relay device 4-8

server side 4-6

TFTP server 4-7

example 4-10

lease options

for IP address information 4-6

for receiving the configuration file 4-6

overview 4-3

relationship to BOOTP 4-4

relay support 1-5, 1-13

support for 1-5

DHCP-based autoconfiguration and image update

configuring4-11to 4-15

understanding4-5to 4-6

DHCP binding database

See DHCP snooping binding database

DHCP binding table

See DHCP snooping binding database

DHCP object tracking, configuring primary interface 47-10

DHCP option 82

circuit ID suboption 26-5

configuration guidelines 26-8

default configuration 26-8

displaying 26-15

forwarding address, specifying 26-10

helper address 26-10

overview 26-3

packet format, suboption

circuit ID 26-5

remote ID 26-5

remote ID suboption 26-5

DHCP server port-based address allocation

configuration guidelines 26-25

default configuration 26-25

described 26-25

displaying 26-28

enabling 26-26

reserved addresses 26-26

DHCP server port-based address assignment

support for 1-5

DHCP snooping

accepting untrusted packets form edge switch 26-3, 26-12

and private VLANs 26-13

binding database

See DHCP snooping binding database

configuration guidelines 26-8

default configuration 26-8

displaying binding tables 26-15

message exchange process 26-4

option 82 data insertion 26-3

trusted interface 26-2

untrusted interface 26-2

untrusted messages 26-2

DHCP snooping binding database

adding bindings 26-14

binding file

format 26-7

location 26-6

bindings 26-6

clearing agent statistics 26-14

configuration guidelines 26-9

configuring 26-14

default configuration 26-8

deleting

binding file 26-14

bindings 26-14

database agent 26-14

described 26-6

displaying 26-15

binding entries 26-15

status and statistics 26-15

enabling 26-14

entry 26-6

renewing database 26-14

resetting

delay value 26-14

timeout value 26-14

DHCP snooping binding table

See DHCP snooping binding database

DHCPv6

configuration guidelines 42-15

default configuration 42-15

described 42-6

enabling client function 42-17

enabling DHCPv6 server function 42-15

support for 1-13

Differentiated Services architecture, QoS 39-2

Differentiated Services Code Point 39-2

Diffusing Update Algorithm (DUAL) 41-33

directed unicast requests 1-5

directories

changing B-4

creating and removing B-4

displaying the working B-4

discovery, clusters

See automatic discovery

displaying switch alarms 3-12

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols 41-3

distribute-list command 41-97

DNS

and DHCP-based autoconfiguration 4-7

default configuration 7-16

displaying the configuration 7-17

in IPv6 42-4

overview 7-15

setting up 7-16

support for 1-5

DNS-based SSM mapping 49-18, 49-19

domain names

DNS 7-15

VTP 17-8

Domain Name System

See DNS

domains, ISO IGRP routing 41-61

dot1q-tunnel switchport mode 16-15

double-tagged packets

IEEE 802.1Q tunneling 20-2

Layer 2 protocol tunneling 20-10

downloadable ACL 12-18, 12-20, 12-61

downloading

configuration files

preparing B-11, B-14, B-17

reasons for B-9

using FTP B-14

using RCP B-18

using TFTP B-12

image files

deleting old image B-29

preparing B-27, B-30, B-34

reasons for B-25

using CMS 1-2

using FTP B-31

using HTTP 1-2, B-25

using RCP B-35

using TFTP B-27

using the device manager or Network Assistant B-25

drop threshold for Layer 2 protocol packets 20-11

DRP

configuring 42-13

described 42-4

IPv6 42-4

support for 1-13

DSCP 1-11, 1-12, 39-2

DSCP input queue threshold map for QoS 39-17

DSCP output queue threshold map for QoS 39-19

DSCP-to-CoS map for QoS 39-67

DSCP-to-DSCP-mutation map for QoS 39-68

DSCP transparency 39-42

DTP 1-8, 16-15

dual-action detection 40-5

DUAL finite state machine, EIGRP 41-33

dual IPv4 and IPv6 templates 10-2, 42-6

dual protocol stacks

IPv4 and IPv6 42-6

SDM templates supporting 42-6

dual-purpose uplinks

defined 14-6

LEDs 14-6

link selection 14-6, 14-14

setting the type 14-14

DVMRP

autosummarization

configuring a summary address 49-57

disabling 49-59

connecting PIM domain to DVMRP router 49-50

enabling unicast routing 49-53

interoperability

with Cisco devices 49-48

with Cisco IOS software 49-8

mrinfo requests, responding to 49-52

neighbors

advertising the default route to 49-51

discovery with Probe messages 49-48

displaying information 49-52

prevent peering with nonpruning 49-55

rejecting nonpruning 49-54

overview 49-8

routes

adding a metric offset 49-59

advertising all 49-59

advertising the default route to neighbors 49-51

caching DVMRP routes learned in report messages 49-53

changing the threshold for syslog messages 49-56

deleting 49-61

displaying 49-61

favoring one over another 49-59

limiting the number injected into MBONE 49-56

limiting unicast route advertisements 49-48

routing table 49-9

source distribution tree, building 49-9

support for 1-13

tunnels

configuring 49-50

displaying neighbor information 49-52

dynamic access ports

characteristics 16-3

configuring 16-27

defined 14-3

dynamic addresses

See addresses

dynamic ARP inspection

ARP cache poisoning 27-1

ARP requests, described 27-1

ARP spoofing attack 27-1

clearing

log buffer 27-15

statistics 27-15

configuration guidelines 27-6

configuring

ACLs for non-DHCP environments 27-8

in DHCP environments 27-7

log buffer 27-12

rate limit for incoming ARP packets 27-4, 27-10

default configuration 27-5

denial-of-service attacks, preventing 27-10

described 27-1

DHCP snooping binding database 27-2

displaying

ARP ACLs 27-14

configuration and operating state 27-14

log buffer 27-15

statistics 27-15

trust state and rate limit 27-14

error-disabled state for exceeding rate limit 27-4

function of 27-2

interface trust states 27-3

log buffer

clearing 27-15

configuring 27-12

displaying 27-15

logging of dropped packets, described 27-4

man-in-the middle attack, described 27-2

network security issues and interface trust states 27-3

priority of ARP ACLs and DHCP snooping entries 27-4

rate limiting of ARP packets

configuring 27-10

described 27-4

error-disabled state 27-4

statistics

clearing 27-15

displaying 27-15

validation checks, performing 27-11

dynamic auto trunking mode 16-15

dynamic desirable trunking mode 16-15

Dynamic Host Configuration Protocol

See DHCP-based autoconfiguration

dynamic port VLAN membership

described 16-25

reconfirming 16-28

troubleshooting 16-30

types of connections 16-27

dynamic routing 41-3

ISO CLNS 41-61

Dynamic Trunking Protocol

See DTP

E

EBGP 41-40

editing features

enabling and disabling 2-6

keystrokes used 2-6

wrapped lines 2-8

EIGRP

authentication 41-37

components 41-33

configuring 41-36

default configuration 41-34

definition 41-33

interface parameters, configuring 41-37

monitoring 41-39

stub routing 41-38

ELIN location 31-3

embedded event manager

actions 37-4

configuring 37-1, 37-5

displaying information 37-6

environmental variables 37-4

event detectors 37-2

policies 37-4

registering and defining an applet 37-5

registering and defining a TCL script 37-6

understanding 37-1

enable password 11-3

enable secret password 11-3

enabling SNMP traps 3-11

encryption, CipherSuite 11-49

encryption for passwords 11-3

Enhanced IGRP

See EIGRP

enhanced object tracking

backup static routing 47-12

defined 47-1

DHCP primary interface 47-10

HSRP 47-7

IP routing state 47-2

IP SLAs 47-9

line-protocol state 47-2

network monitoring with IP SLAs 47-11

routing policy, configuring 47-12

static route primary interface 47-10

tracked lists 47-3

enhanced object tracking static routing 47-10

environmental variables, embedded event manager 37-4

environment variables, function of 4-22

equal-cost routing 1-13, 41-87

error-disabled state, BPDU 23-2

error messages during command entry 2-4

EtherChannel

automatic creation of 40-4, 40-6

channel groups

binding physical and logical interfaces 40-3

numbering of 40-3

configuration guidelines 40-10

configuring

Layer 2 interfaces 40-11

Layer 3 physical interfaces 40-14

Layer 3 port-channel logical interfaces 40-13

default configuration 40-10

described 40-2

displaying status 40-20

forwarding methods 40-7, 40-16

IEEE 802.3ad, described 40-6

interaction

with STP 40-10

with VLANs 40-11

LACP

described 40-6

displaying status 40-20

hot-standby ports 40-18

interaction with other features 40-7

modes 40-6

port priority 40-19

system priority 40-19

Layer 3 interface 41-3

load balancing 40-7, 40-16

logical interfaces, described 40-3

PAgP

aggregate-port learners 40-17

compatibility with Catalyst 1900 40-17

described 40-4

displaying status 40-20

interaction with other features 40-6

interaction with virtual switches 40-5

learn method and priority configuration 40-17

modes 40-5

support for 1-3

with dual-action detection 40-5

port-channel interfaces

described 40-3

numbering of 40-3

port groups 14-6

support for 1-3

EtherChannel guard

described 23-7

disabling 23-14

enabling 23-14

Ethernet VLANs

adding 16-8

defaults and ranges 16-7

modifying 16-8

EUI 42-3

event detectors, embedded event manager 37-2

events, RMON 34-4

examples

network configuration 1-17

expedite queue for QoS 39-81

Express Setup 1-2

See also getting started guide

extended crashinfo file 52-18

extended-range VLANs

configuration guidelines 16-11

configuring 16-10

creating 16-12

creating with an internal VLAN ID 16-13

defined 16-1

extended system ID

MSTP 22-18

STP 21-4, 21-14

extended universal identifier

See EUI

Extensible Authentication Protocol over LAN 12-1

external BGP

See EBGP

external neighbors, BGP 41-45

F

fa0 interface 1-6

fallback bridging

and protected ports 51-3

bridge groups

creating 51-3

described 51-1

displaying 51-10

function of 51-2

number supported 51-4

removing 51-4

bridge table

clearing 51-10

displaying 51-10

configuration guidelines 51-3

connecting interfaces with 14-7

default configuration 51-3

described 51-1

frame forwarding

flooding packets 51-2

forwarding packets 51-2

overview 51-1

protocol, unsupported 51-3

STP

disabling on an interface 51-9

forward-delay interval 51-8

hello BPDU interval 51-8

interface priority 51-6

maximum-idle interval 51-9

path cost 51-7

VLAN-bridge spanning-tree priority 51-5

VLAN-bridge STP 51-2

support for 1-13

SVIs and routed ports 51-1

unsupported protocols 51-3

VLAN-bridge STP 21-10

Fast Convergence 25-3

FCS bit error rate alarm

configuring 3-8

defined 3-3

FCS error hysteresis threshold 3-2

features, incompatible 29-12

FIB 41-86

fiber-optic, detecting unidirectional links 33-1

files

basic crashinfo

description 52-18

location 52-18

copying B-5

crashinfo, description 52-18

deleting B-6

displaying the contents of B-8

extended crashinfo

description 52-19

location 52-19

tar

creating B-6

displaying the contents of B-7

extracting B-8

image file format B-26

file system

displaying available file systems B-2

displaying file information B-3

local file system names B-1

network file system names B-5

setting the default B-3

filtering

in a VLAN 38-29

IPv6 traffic 44-3, 44-7

non-IP traffic 38-27

show and more command output 2-9

filtering show and more command output 2-9

filters, IP

See ACLs, IP

flash device, number of B-1

flexible authentication ordering

configuring 12-64

overview 12-29

Flex Link Multicast Fast Convergence 25-3

Flex Links

configuration guidelines 25-8

configuring 25-9, 25-10

configuring preferred VLAN 25-12

configuring VLAN load balancing 25-11

default configuration 25-8

description 25-1

link load balancing 25-2

monitoring 25-14

VLANs 25-2

flooded traffic, blocking 29-8

flow-based packet classification 1-12

flowcharts

QoS classification 39-7

QoS egress queueing and scheduling 39-18

QoS ingress queueing and scheduling 39-16

QoS policing and marking 39-11

flowcontrol

configuring 14-18

described 14-18

forward-delay time

MSTP 22-24

STP 21-21

Forwarding Information Base

See FIB

forwarding nonroutable protocols 51-1

FTP

accessing MIB files A-4

configuration files

downloading B-14

overview B-13

preparing the server B-14

uploading B-16

image files

deleting old image B-33

downloading B-31

preparing the server B-30

uploading B-33

G

general query 25-5

Generating IGMP Reports 25-3

get-bulk-request operation 36-3

get-next-request operation 36-3, 36-4

get-request operation 36-3, 36-4

get-response operation 36-3

global configuration mode 2-2

global leave, IGMP 28-13

global status monitoring alarms 3-2

guest VLAN and 802.1x 12-21

guide mode 1-2

GUIs

See device manager and Network Assistant

H

hardware limitations and Layer 3 interfaces 14-21

hello time

MSTP 22-24

STP 21-20

help, for the command line 2-3

hierarchical policy maps 39-9

configuration guidelines 39-35

configuring 39-54

described 39-12

history

changing the buffer size 2-5

described 2-5

disabling 2-6

recalling commands 2-5

history table, level and number of syslog messages 35-10

host names, in clusters 6-13

host ports

configuring 19-11

kinds of 19-2

hosts, limit on dynamic ports 16-30

Hot Standby Router Protocol

See HSRP

HP OpenView 1-4

HSRP

authentication string 45-10

automatic cluster recovery 6-12

binding to cluster group 45-12

cluster standby group considerations 6-11

command-switch redundancy 1-7

configuring 45-4

default configuration 45-5

definition 45-1

guidelines 45-5

monitoring 45-13

object tracking 47-7

overview 45-1

priority 45-7

routing redundancy 1-12

support for ICMP redirect messages 45-12

timers 45-10

tracking 45-8

See also clusters, cluster standby group, and standby command switch

HSRP for IPv6

configuring 42-24

guidelines 42-23

HTTP over SSL

see HTTPS

HTTPS 11-48

configuring 11-51

self-signed certificate 11-48

HTTP secure server 11-48

I

IBPG 41-40

ICMP

IPv6 42-4

redirect messages 41-11

support for 1-13

time-exceeded messages 52-12

traceroute and 52-12

unreachable messages 38-20

unreachable messages and IPv6 44-4

unreachables and ACLs 38-21

ICMP Echo operation

configuring 46-12

IP SLAs 46-12

ICMP ping

executing 52-9

overview 52-9

ICMP Router Discovery Protocol

See IRDP

ICMPv6 42-4

IDS appliances

and ingress RSPAN 30-19

and ingress SPAN 30-13

IEEE 1588 standard 8-1

IEEE 802.1D

See STP

IEEE 802.1p 18-1

IEEE 802.1Q

and trunk ports 14-3

configuration limitations 16-16

encapsulation 16-14

native VLAN for untagged traffic 16-20

tunneling

compatibility with other features 20-5

defaults 20-4

described 20-1

tunnel ports with other features 20-6

IEEE 802.1s

See MSTP

IEEE 802.1w

See RSTP

IEEE 802.1x

See port-based authentication

IEEE 802.3ad

See EtherChannel

IEEE 802.3x flow control 14-18

ifIndex values, SNMP 36-5

IFS 1-5

IGMP

configurable leave timer

described 28-6

enabling 28-11

configuring the switch

as a member of a group 49-38

statically connected member 49-42

controlling access to groups 49-39

default configuration 49-38

deleting cache entries 49-61

displaying groups 49-61

fast switching 49-43

flooded multicast traffic

controlling the length of time 28-12

disabling on an interface 28-13

global leave 28-13

query solicitation 28-13

recovering from flood mode 28-13

host-query interval, modifying 49-40

joining multicast group 28-3

join messages 28-3

leave processing, enabling 28-10, 43-8

leaving multicast group 28-5

multicast reachability 49-38

overview 49-2

queries 28-4

report suppression

described 28-6

disabling 28-15, 43-11

supported versions 28-3

support for 1-3

Version 1

changing to Version 2 49-40

described 49-3

Version 2

changing to Version 1 49-40

described 49-3

maximum query response time value 49-42

pruning groups 49-42

query timeout value 49-41

IGMP filtering

configuring 28-24

default configuration 28-24

described 28-23

monitoring 28-28

support for 1-3

IGMP groups

configuring filtering 28-27

setting the maximum number 28-26

IGMP helper 1-3, 49-6

IGMP Immediate Leave

configuration guidelines 28-11

described 28-5

enabling 28-10

IGMP profile

applying 28-25

configuration mode 28-24

configuring 28-25

IGMP snooping

and address aliasing 28-2

configuring 28-6

default configuration 28-7, 43-5, 43-6

definition 28-2

enabling and disabling 28-7, 43-6

global configuration 28-7

Immediate Leave 28-5

method 28-8

monitoring 28-16, 43-11

querier

configuration guidelines 28-14

configuring 28-14

supported versions 28-3

support for 1-3

VLAN configuration 28-8

IGMP throttling

configuring 28-27

default configuration 28-24

described 28-24

displaying action 28-28

IGP 41-24

Immediate Leave, IGMP 28-5

enabling 43-8

inaccessible authentication bypass 12-23

support for multiauth ports 12-23

initial configuration

defaults 1-14

Express Setup 1-2

interface

range macros 14-11

interface command14-7to 14-9

interface configuration

REP 24-9

interface configuration mode 2-2

interfaces

auto-MDIX, configuring 14-19

configuration guidelines

duplex and speed 14-16

configuring

procedure 14-8

counters, clearing 14-25

default configuration 14-13

described 14-20

descriptive name, adding 14-20

displaying information about 14-24

flow control 14-18

management 1-4

monitoring 14-24

naming 14-20

physical, identifying 14-7

range of 14-9

restarting 14-26

shutting down 14-26

speed and duplex, configuring 14-17

status 14-24

supported 14-7

types of 14-1

interfaces range macro command 14-11

interface types 14-7

Interior Gateway Protocol

See IGP

internal BGP

See IBGP

internal neighbors, BGP 41-45

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Internet Protocol version 6

See IPv6

inter-VLAN routing 1-13, 41-2

Intrusion Detection System

See IDS appliances

inventory management TLV 31-3, 31-7

IP ACLs

for QoS classification 39-8

implicit deny 38-9, 38-14

implicit masks 38-9

named 38-14

undefined 38-20

IP addresses

128-bit 42-2

candidate or member 6-3, 6-13

classes of 41-5

cluster access 6-2

command switch 6-3, 6-11, 6-13

default configuration 41-4

discovering 7-30

for IP routing 41-4

IPv6 42-2

MAC address association 41-8

monitoring 41-17

redundant clusters 6-11

standby command switch 6-11, 6-13

See also IP information

IP broadcast address 41-15

ip cef distributed command 41-86

IP directed broadcasts 41-13

ip igmp profile command 28-24

IP information

assigned

manually 4-15

through DHCP-based autoconfiguration 4-3

default configuration 4-3

IP multicast routing

addresses

all-hosts 49-3

all-multicast-routers 49-3

host group address range 49-3

administratively-scoped boundaries, described 49-46

and IGMP snooping 28-2

Auto-RP

adding to an existing sparse-mode cloud 49-25

benefits of 49-25

clearing the cache 49-61

configuration guidelines 49-11

filtering incoming RP announcement messages 49-28

overview 49-6

preventing candidate RP spoofing 49-28

preventing join messages to false RPs 49-27

setting up in a new internetwork 49-25

using with BSR 49-33

bootstrap router

configuration guidelines 49-11

configuring candidate BSRs 49-31

configuring candidate RPs 49-32

defining the IP multicast boundary 49-30

defining the PIM domain border 49-29

overview 49-7

using with Auto-RP 49-33

Cisco implementation 49-1

configuring

basic multicast routing 49-11

IP multicast boundary 49-46

default configuration 49-10

enabling

multicast forwarding 49-12

PIM mode 49-12

group-to-RP mappings

Auto-RP 49-6

BSR 49-7

MBONE

deleting sdr cache entries 49-61

described 49-44

displaying sdr cache 49-62

enabling sdr listener support 49-45

limiting DVMRP routes advertised 49-56

limiting sdr cache entry lifetime 49-45

SAP packets for conference session announcement 49-45

Session Directory (sdr) tool, described 49-44

monitoring

packet rate loss 49-62

peering devices 49-62

tracing a path 49-62

multicast forwarding, described 49-7

PIMv1 and PIMv2 interoperability 49-10

protocol interaction 49-2

reverse path check (RPF) 49-7

routing table

deleting 49-61

displaying 49-62

RP

assigning manually 49-23

configuring Auto-RP 49-25

configuring PIMv2 BSR 49-29

monitoring mapping information 49-33

using Auto-RP and BSR 49-33

statistics, displaying system and network 49-61

See also CGMP

See also DVMRP

See also IGMP

See also PIM

IP phones

and QoS 18-1

automatic classification and queueing 39-21

configuring 18-4

ensuring port security with QoS 39-40

trusted boundary for QoS 39-40

IP Port Security for Static Hosts

on a Layer 2 access port 26-19

on a PVLAN host port 26-23

IP precedence 39-2

IP-precedence-to-DSCP map for QoS 39-65

IP protocols

in ACLs 38-11

routing 1-13

IP routes, monitoring 41-100

IP routing

connecting interfaces with 14-7

disabling 41-18

enabling 41-18

IP Service Level Agreements

See IP SLAs

IP service levels, analyzing 46-1

IP SLAs

benefits 46-2

configuration guidelines 46-6

configuring object tracking 47-9

Control Protocol 46-4

default configuration 46-6

definition 46-1

ICMP echo operation 46-12

measuring network performance 46-3

monitoring 46-14

multioperations scheduling 46-5

object tracking 47-9

operation 46-3

reachability tracking 47-9

responder

described 46-4

enabling 46-8

response time 46-4

scheduling 46-5

SNMP support 46-2

supported metrics 46-2

threshold monitoring 46-6

track object monitoring agent, configuring 47-11

track state 47-9

UDP jitter operation 46-9

IP source guard

and 802.1x 26-18

and DHCP snooping 26-15

and EtherChannels 26-18

and port security 26-18

and private VLANs 26-18

and routed ports 26-17

and TCAM entries 26-18

and trunk interfaces 26-17

and VRF 26-18

binding configuration

automatic 26-15

manual 26-15

binding table 26-15

configuration guidelines 26-17

default configuration 26-17

described 26-15

disabling 26-19

displaying

active IP or MAC bindings 26-24

bindings 26-24

configuration 26-24

enabling 26-18, 26-19

filtering

source IP address 26-16

source IP and MAC address 26-16

source IP address filtering 26-16

source IP and MAC address filtering 26-16

static bindings

adding 26-18, 26-19

deleting 26-19

static hosts 26-19

IP traceroute

executing 52-12

overview 52-12

IP unicast routing

address resolution 41-8

administrative distances 41-88, 41-98

ARP 41-8

assigning IP addresses to Layer 3 interfaces 41-5

authentication keys 41-98

broadcast

address 41-15

flooding 41-16

packets 41-13

storms 41-13

classless routing 41-6

configuring static routes 41-87

default

addressing configuration 41-4

gateways 41-11

networks 41-89

routes 41-88

routing 41-2

directed broadcasts 41-13

disabling 41-18

dynamic routing 41-3

enabling 41-18

EtherChannel Layer 3 interface 41-3

IGP 41-24

inter-VLAN 41-2

IP addressing

classes 41-5

configuring 41-4

IPv6 42-3

IRDP 41-11

Layer 3 interfaces 41-3

MAC address and IP address 41-8

passive interfaces 41-96

protocols

distance-vector 41-3

dynamic 41-3

link-state 41-3

proxy ARP 41-8

redistribution 41-89

reverse address resolution 41-8

routed ports 41-3

static routing 41-3

steps to configure 41-4

subnet mask 41-5

subnet zero 41-6

supernet 41-6

UDP 41-14

with SVIs 41-3

See also BGP

See also EIGRP

See also OSPF

See also RIP

IPv4 ACLs

applying to interfaces 38-19

extended, creating 38-10

named 38-14

standard, creating 38-9

IPv4 and IPv6

dual protocol stacks 42-5

IPv6

ACLs

displaying 44-8

limitations 44-2

matching criteria 44-3

port 44-1

precedence 44-2

router 44-1

supported 44-2

addresses 42-2

address formats 42-2

applications 42-5

assigning address 42-11

autoconfiguration 42-5

CEFv6 42-18

configuring static routes 42-19

default configuration 42-10

default router preference (DRP) 42-4

defined 42-2

Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 42-7

EIGRP IPv6 Commands 42-7

Router ID 42-7

feature limitations 42-9

features not supported 42-8

forwarding 42-11

ICMP 42-4

monitoring 42-26

neighbor discovery 42-4

OSPF 42-7

path MTU discovery 42-4

SDM templates 10-2, 43-1, 44-1

Stateless Autoconfiguration 42-5

supported features 42-3

switch limitations 42-9

understanding static routes 42-6

IPv6 traffic, filtering 44-3

IRDP

configuring 41-12

definition 41-11

support for 1-13

IS-IS

addresses 41-61

area routing 41-61

default configuration 41-63

monitoring 41-70

show commands 41-70

system routing 41-61

ISL

and IPv6 42-3

ISO CLNS

clear commands 41-70

dynamic routing protocols 41-61

monitoring 41-70

NETs 41-61

NSAPs 41-61

OSI standard 41-61

ISO IGRP

area routing 41-61

system routing 41-61

isolated port 19-2

isolated VLANs 19-2, 19-3

J

join messages, IGMP 28-3

K

KDC

described 11-39

See also Kerberos

Kerberos

authenticating to

boundary switch 11-41

KDC 11-41

network services 11-42

configuration examples 11-38

configuring 11-42

credentials 11-39

cryptographic software image 11-38

described 11-39

KDC 11-39

operation 11-41

realm 11-40

server 11-40

support for 1-11

switch as trusted third party 11-38

terms 11-39

TGT 11-40

tickets 11-39

key distribution center

See KDC

L

l2protocol-tunnel command 20-12

LACP

Layer 2 protocol tunneling 20-9

See EtherChannel

Layer 2 frames, classification with CoS 39-2

Layer 2 interfaces, default configuration 14-13

Layer 2 protocol tunneling

configuring 20-10

configuring for EtherChannels 20-14

default configuration 20-11

defined 20-8

guidelines 20-11

Layer 2 traceroute

and ARP 52-11

and CDP 52-10

broadcast traffic 52-10

described 52-10

IP addresses and subnets 52-11

MAC addresses and VLANs 52-11

multicast traffic 52-11

multiple devices on a port 52-11

unicast traffic 52-10

usage guidelines 52-10

Layer 3 features 1-12

Layer 3 interfaces

assigning IP addresses to 41-5

assigning IPv4 and IPv6 addresses to 42-14

assigning IPv6 addresses to 42-11

changing from Layer 2 mode 41-5, 41-78

types of 41-3

Layer 3 packets, classification methods 39-2

LDAP 5-2

Leaking IGMP Reports 25-4

LEDs, switch

See hardware installation guide

lightweight directory access protocol

See LDAP

line configuration mode 2-2

Link Aggregation Control Protocol

See EtherChannel

link failure, detecting unidirectional 22-8

link fault alarm 3-3

link integrity, verifying with REP 24-3

Link Layer Discovery Protocol

See CDP

link local unicast addresses 42-3

link redundancy

See Flex Links

links, unidirectional 33-1

link state advertisements (LSAs) 41-28

link-state protocols 41-3

link-state tracking

configuring 40-23

described 40-21

LLDP

configuring 31-4

characteristics 31-6

default configuration 31-4

enabling 31-5

monitoring and maintaining 31-10

overview 31-1

supported TLVs 31-2

switch stack considerations 31-2

transmission timer and holdtime, setting 31-6

LLDP-MED

configuring

procedures 31-4

TLVs 31-7

monitoring and maintaining 31-10

overview 31-1, 31-2

supported TLVs 31-2

LLDP Media Endpoint Discovery

See LLDP-MED

load balancing 45-4

local SPAN 30-2

location TLV 31-3, 31-7

logging messages, ACL 38-8

login authentication

with RADIUS 11-28

with TACACS+ 11-14

login banners 7-17

log messages

See system message logging

Long-Reach Ethernet (LRE) technology 1-19

loop guard

described 23-9

enabling 23-15

support for 1-7

LRE profiles, considerations in switch clusters 6-14

M

MAB

See MAC authentication bypass

MAB aging timer 1-8

MAB inactivity timer

default setting 12-34

range 12-37

MAC/PHY configuration status TLV 31-2

MAC addresses

aging time 7-21

and VLAN association 7-20

building the address table 7-20

default configuration 7-21

disabling learning on a VLAN 7-29

discovering 7-30

displaying 7-30

displaying in the IP source binding table 26-24

dynamic

learning 7-20

removing 7-22

in ACLs 38-27

IP address association 41-8

static

adding 7-27

allowing 7-28, 7-29

characteristics of 7-26

dropping 7-28

removing 7-27

MAC address learning 1-5

MAC address learning, disabling on a VLAN 7-29

MAC address notification, support for 1-14

MAC address-table move update

configuration guidelines 25-8

configuring 25-12

default configuration 25-8

description 25-6

monitoring 25-14

MAC address-to-VLAN mapping 16-25

MAC authentication bypass 12-36

configuring 12-57

overview 12-16

See MAB

MAC extended access lists

applying to Layer 2 interfaces 38-28

configuring for QoS 39-47

creating 38-27

defined 38-27

for QoS classification 39-6

magic packet 12-26

manageability features 1-5

management access

in-band

browser session 1-6

CLI session 1-6

device manager 1-6

SNMP 1-6

out-of-band console port connection 1-6

management address TLV 31-2

management options

CLI 2-1

clustering 1-2

CNS 5-1

Network Assistant 1-2

overview 1-4

management VLAN

considerations in switch clusters 6-7

discovery through different management VLANs 6-7

manual preemption, REP, configuring 24-13

mapping tables for QoS

configuring

CoS-to-DSCP 39-64

DSCP 39-63

DSCP-to-CoS 39-67

DSCP-to-DSCP-mutation 39-68

IP-precedence-to-DSCP 39-65

policed-DSCP 39-66

described 39-13

marking

action with aggregate policers 39-61

described 39-4, 39-9

matching

IPv6 ACLs 44-3

matching, IPv4 ACLs 38-7

maximum aging time

MSTP 22-25

STP 21-21

maximum hop count, MSTP 22-25

maximum number of allowed devices, port-based authentication 12-37

maximum-paths command 41-49, 41-87

MDA

configuration guidelines12-12to 12-13

described 1-9, 12-12

exceptions with authentication process 12-5

membership mode, VLAN port 16-3

member switch

automatic discovery 6-4

defined 6-2

managing 6-14

passwords 6-13

recovering from lost connectivity 52-7

requirements 6-3

See also candidate switch, cluster standby group, and standby command switch

messages, to users through banners 7-17

metrics, in BGP 41-49

metric translations, between routing protocols 41-92

metro tags 20-2

MHSRP 45-4

MIBs

accessing files with FTP A-4

location of files A-4

overview 36-1

SNMP interaction with 36-4

supported A-1

mirroring traffic for analysis 30-1

mismatches, autonegotiation 52-7

module number 14-8

monitoring

access groups 38-41

alarms 3-12

BGP 41-60

cables for unidirectional links 33-1

CDP 32-5

CEF 41-86

EIGRP 41-39

fallback bridging 51-10

features 1-14

Flex Links 25-14

HSRP 45-13

IEEE 802.1Q tunneling 20-17

IGMP

filters 28-28

snooping 28-16, 43-11

interfaces 14-24

IP

address tables 41-17

multicast routing 49-60

routes 41-100

IP SLAs operations 46-14

IPv4 ACL configuration 38-41

IPv6 42-26

IPv6 ACL configuration 44-8

IS-IS 41-70

ISO CLNS 41-70

Layer 2 protocol tunneling 20-17

MAC address-table move update 25-14

MSDP peers 50-18

multicast router interfaces 28-16, 43-11

multi-VRF CE 41-85

MVR 28-23

network traffic for analysis with probe 30-2

object tracking 47-13

OSPF 41-32

port

blocking 29-19

protection 29-19

private VLANs 19-14

PROFINET 9-5

PTP 8-4

REP 24-13

RP mapping information 49-33

SFP status 14-25, 52-8

source-active messages 50-18

speed and duplex mode 14-17

SSM mapping 49-21

traffic flowing among switches 34-1

traffic suppression 29-19

tunneling 20-17

VLAN

filters 38-41

maps 38-41

VLANs 16-14

VMPS 16-29

VTP 17-16

mrouter Port 25-3

mrouter port 25-5

MSDP

benefits of 50-3

clearing MSDP connections and statistics 50-18

controlling source information

forwarded by switch 50-11

originated by switch 50-8

received by switch 50-13

default configuration 50-4

dense-mode regions

sending SA messages to 50-16

specifying the originating address 50-17

filtering

incoming SA messages 50-14

SA messages to a peer 50-12

SA requests from a peer 50-10

join latency, defined 50-6

meshed groups

configuring 50-15

defined 50-15

originating address, changing 50-17

overview 50-1

peer-RPF flooding 50-2

peers

configuring a default 50-4

monitoring 50-18

peering relationship, overview 50-1

requesting source information from 50-8

shutting down 50-15

source-active messages

caching 50-6

clearing cache entries 50-18

defined 50-2

filtering from a peer 50-10

filtering incoming 50-14

filtering to a peer 50-12

limiting data with TTL 50-13

monitoring 50-18

restricting advertised sources 50-9

support for 1-13

MSTP

boundary ports

configuration guidelines 22-15

described 22-6

BPDU filtering

described 23-3

enabling 23-12

BPDU guard

described 23-2

enabling 23-11

CIST, described 22-3

CIST regional root 22-3

CIST root 22-5

configuration guidelines 22-15, 23-10

configuring

forward-delay time 22-24

hello time 22-24

link type for rapid convergence 22-26

maximum aging time 22-25

maximum hop count 22-25

MST region 22-16

neighbor type 22-26

path cost 22-21

port priority 22-20

root switch 22-18

secondary root switch 22-19

switch priority 22-23

CST

defined 22-3

operations between regions 22-3

default configuration 22-15

default optional feature configuration 23-9

displaying status 22-27

enabling the mode 22-16

EtherChannel guard

described 23-7

enabling 23-14

extended system ID

effects on root switch 22-18

effects on secondary root switch 22-19

unexpected behavior 22-18

IEEE 802.1s

implementation 22-7

port role naming change 22-7

terminology 22-5

instances supported 21-9

interface state, blocking to forwarding 23-2

interoperability and compatibility among modes 21-10

interoperability with IEEE 802.1D

described 22-8

restarting migration process 22-27

IST

defined 22-2

master 22-3

operations within a region 22-3

loop guard

described 23-9

enabling 23-15

mapping VLANs to MST instance 22-16

MST region

CIST 22-3

configuring 22-16

described 22-2

hop-count mechanism 22-6

IST 22-2

supported spanning-tree instances 22-2

optional features supported 1-7

overview 22-2

Port Fast

described 23-2

enabling 23-10

preventing root switch selection 23-8

root guard

described 23-8

enabling 23-15

root switch

configuring 22-18

effects of extended system ID 22-18

unexpected behavior 22-18

shutdown Port Fast-enabled port 23-2

status, displaying 22-27

multiauth

support for inaccessible authentication bypass 12-23

multiauth mode

See multiple-authentication mode

multicast groups

Immediate Leave 28-5

joining 28-3

leaving 28-5

static joins 28-10, 43-7

multicast packets

ACLs on 38-40

blocking 29-8

multicast router interfaces, monitoring 28-16, 43-11

multicast router ports, adding 28-9, 43-8

Multicast Source Discovery Protocol

See MSDP

multicast storm 29-1

multicast storm-control command 29-4

multicast television application 28-17

multicast VLAN 28-17

Multicast VLAN Registration

See MVR

multidomain authentication

See MDA

multioperations scheduling, IP SLAs 46-5

multiple authentication 12-13

multiple authentication mode

configuring 12-43

Multiple HSRP

See MHSRP

multiple VPN routing/forwarding in customer edge devices

See multi-VRF CE

multi-VRF CE

configuration example 41-81

configuration guidelines 41-74

configuring 41-73

default configuration 41-73

defined 41-71

displaying 41-85

monitoring 41-85

network components 41-73

packet-forwarding process 41-73

support for 1-13

MVR

and address aliasing 28-20

and IGMPv3 28-20

configuration guidelines 28-20

configuring interfaces 28-21

default configuration 28-19

described 28-17

example application 28-17

modes 28-21

monitoring 28-23

multicast television application 28-17

setting global parameters 28-20

support for 1-3

N

NAC

AAA down policy 1-10

critical authentication 12-23, 12-54

IEEE 802.1x authentication using a RADIUS server 12-59

IEEE 802.1x validation using RADIUS server 12-59

inaccessible authentication bypass 1-10, 12-54

Layer 2 IEEE 802.1x validation 1-10, 12-29, 12-59

Layer 2 IP validation 1-10

named IPv4 ACLs 38-14

NameSpace Mapper

See NSM

native VLAN

and IEEE 802.1Q tunneling 20-4

configuring 16-20

default 16-20

NEAT

configuring 12-60

overview 12-30

neighbor discovery, IPv6 42-4

neighbor discovery/recovery, EIGRP 41-33

neighbor offset numbers, REP 24-4

neighbors, BGP 41-55

Network Admission Control

NAC

Network Assistant

benefits 1-2

described 1-4

downloading image files 1-2

guide mode 1-2

management options 1-2

upgrading a switch B-25

wizards 1-2

network configuration examples

increasing network performance 1-18

providing network services 1-18

network design

performance 1-18

services 1-18

Network Edge Access Topology

See NEAT

network management

CDP 32-1

RMON 34-1

SNMP 36-1

network performance, measuring with IP SLAs 46-3

network policy TLV 31-2, 31-7

Network Time Protocol

See NTP

no commands 2-4

nonhierarchical policy maps

configuration guidelines 39-35

described 39-10

non-IP traffic filtering 38-27

nontrunking mode 16-15

normal-range VLANs 16-4

configuration guidelines 16-6

configuring 16-4

defined 16-1

no switchport command 14-4

not-so-stubby areas

See NSSA

NSAPs, as ISO IGRP addresses 41-61

NSF Awareness

IS-IS 41-63

NSM 5-3

NSSA, OSPF 41-28

NTP

associations

authenticating 7-4

defined 7-2

enabling broadcast messages 7-6

peer 7-5

server 7-5

default configuration 7-4

displaying the configuration 7-11

overview 7-2

restricting access

creating an access group 7-8

disabling NTP services per interface 7-10

source IP address, configuring 7-10

stratum 7-2

support for 1-5

synchronizing devices 7-5

time

services 7-2

synchronizing 7-2

O

object tracking

HSRP 47-7

IP SLAs 47-9

IP SLAs, configuring 47-9

monitoring 47-13

off mode, VTP 17-3

open1x

configuring 12-65

open1x authentication

overview 12-29

Open Shortest Path First

See OSPF

optimizing system resources 10-1

options, management 1-4

OSPF

area parameters, configuring 41-28

configuring 41-26

default configuration

metrics 41-30

route 41-29

settings 41-25

described 41-23

for IPv6 42-7

interface parameters, configuring 41-27

LSA group pacing 41-31

monitoring 41-32

router IDs 41-31

route summarization 41-29

support for 1-13

virtual links 41-29

out-of-profile markdown 1-12

P

packet modification, with QoS 39-20

PAgP

Layer 2 protocol tunneling 20-9

See EtherChannel

parallel paths, in routing tables 41-87

passive interfaces

configuring 41-96

OSPF 41-30

passwords

default configuration 11-2

disabling recovery of 11-5

encrypting 11-3

for security 1-9

in clusters 6-13

overview 11-1

recovery of 52-3

setting

enable 11-3

enable secret 11-3

Telnet 11-6

with usernames 11-6

VTP domain 17-8

path cost

MSTP 22-21

STP 21-18

path MTU discovery 42-4

PBR

defined 41-93

enabling 41-94

fast-switched policy-based routing 41-96

local policy-based routing 41-96

PC (passive command switch) 6-10

peers, BGP 41-55

percentage thresholds in tracked lists 47-6

performance, network design 1-18

performance features 1-3

persistent self-signed certificate 11-48

per-user ACLs and Filter-Ids 12-8

per-VLAN spanning-tree plus

See PVST+

PE to CE routing, configuring 41-80

physical ports 14-2

PIM

default configuration 49-10

dense mode

overview 49-4

rendezvous point (RP), described 49-5

RPF lookups 49-8

displaying neighbors 49-62

enabling a mode 49-12

overview 49-3

router-query message interval, modifying 49-36

shared tree and source tree, overview 49-34

shortest path tree, delaying the use of 49-35

sparse mode

join messages and shared tree 49-5

overview 49-5

prune messages 49-5

RPF lookups 49-8

stub routing

configuration guidelines 49-22

displaying 49-62

enabling 49-22

overview 49-5

support for 1-13

versions

interoperability 49-10

troubleshooting interoperability problems 49-34

v2 improvements 49-4

PIM-DVMRP, as snooping method 28-8

ping

character output description 52-10

executing 52-9

overview 52-9

policed-DSCP map for QoS 39-66

policers

configuring

for each matched traffic class 39-50

for more than one traffic class 39-61

described 39-4

displaying 39-82

number of 39-36

types of 39-10

policing

described 39-4

hierarchical

See hierarchical policy maps

token-bucket algorithm 39-10

policy-based routing

See PBR

policy maps for QoS

characteristics of 39-50

described 39-8

displaying 39-83

hierarchical 39-9

hierarchical on SVIs

configuration guidelines 39-35

configuring 39-54

described 39-12

nonhierarchical on physical ports

configuration guidelines 39-35

described 39-10

port ACLs

defined 38-2

types of 38-3

Port Aggregation Protocol

See EtherChannel

port-based authentication

accounting 12-14

authentication server

defined 12-3, 13-2

RADIUS server 12-3

client, defined 12-3, 13-2

configuration guidelines 12-35, 13-9

configuring

802.1x authentication 12-40

guest VLAN 12-51

host mode 12-43

inaccessible authentication bypass 12-54

manual re-authentication of a client 12-45

periodic re-authentication 12-44

quiet period 12-46

RADIUS server 12-43, 13-13

RADIUS server parameters on the switch 12-42, 13-11

restricted VLAN 12-52

switch-to-client frame-retransmission number 12-47, 12-48

switch-to-client retransmission time 12-46

violation modes12-39to 12-40

default configuration 12-33, 13-9

described 12-1

device roles 12-2, 13-2

displaying statistics 12-67, 13-17

downloadable ACLs and redirect URLs

configuring12-61to12-63, ??to 12-64

overview12-18to 12-20

EAPOL-start frame 12-5

EAP-request/identity frame 12-5

EAP-response/identity frame 12-5

enabling

802.1X authentication 13-11

encapsulation 12-3

flexible authentication ordering

configuring 12-64

overview 12-29

guest VLAN

configuration guidelines 12-22, 12-23

described 12-21

host mode 12-11

inaccessible authentication bypass

configuring 12-54

described 12-23

guidelines 12-36

initiation and message exchange 12-5

magic packet 12-26

maximum number of allowed devices per port 12-37

method lists 12-40

multiple authentication 12-13

per-user ACLs

AAA authorization 12-40

configuration tasks 12-18

described 12-17

RADIUS server attributes 12-18

ports

authorization state and dot1x port-control command 12-10

authorized and unauthorized 12-10

voice VLAN 12-24

port security

and voice VLAN 12-26

described 12-25

interactions 12-25

multiple-hosts mode 12-11

readiness check

configuring 12-37

described 12-16, 12-37

resetting to default values 12-66

statistics, displaying 12-67

switch

as proxy 12-3, 13-2

RADIUS client 12-3

switch supplicant

configuring 12-60

overview 12-30

user distribution

guidelines 12-28

overview 12-28

VLAN assignment

AAA authorization 12-40

characteristics 12-16

configuration tasks 12-17

described 12-16

voice aware 802.1x security

configuring 12-38

described 12-30, 12-38

voice VLAN

described 12-24

PVID 12-24

VVID 12-24

wake-on-LAN, described 12-26

with ACLs and RADIUS Filter-Id attribute 12-31

port-based authentication methods, supported 12-7

port blocking 1-3, 29-7

port-channel

See EtherChannel

port description TLV 31-2

Port Fast

described 23-2

enabling 23-10

mode, spanning tree 16-26

support for 1-7

port membership modes, VLAN 16-3

port not forwarding alarm 3-3

port not operating alarm 3-3

port priority

MSTP 22-20

STP 21-17

ports

access 14-3

blocking 29-7

dual-purpose uplink 14-6

dynamic access 16-3

IEEE 802.1Q tunnel 16-4

protected 29-6

REP 24-6

routed 14-4

secure 29-8

static-access 16-3, 16-9

switch 14-2

trunks 16-3, 16-14

VLAN assignments 16-9

port security

aging 29-17

and private VLANs 29-18

and QoS trusted boundary 39-40

configuring 29-13

default configuration 29-11

described 29-8

displaying 29-19

enabling 29-18

on trunk ports 29-14

sticky learning 29-9

violations 29-10

with other features 29-11

port-shutdown response, VMPS 16-25

port status monitoring alarms

FCS bit error rate alarm 3-3

link fault alarm 3-3

port not forwarding alarm 3-3

port not operating alarm 3-3

port VLAN ID TLV 31-2

power management TLV 31-2, 31-7

power supply alarm, configuring 3-5

Precision Time Protocol

See PTP

preempt delay time, REP 24-5

preemption, default configuration 25-8

preemption delay, default configuration 25-8

preferential treatment of traffic

See QoS

prefix lists, BGP 41-53

preventing unauthorized access 11-1

primary edge port, REP 24-4

primary interface for object tracking, DHCP, configuring 47-10

primary interface for static routing, configuring 47-10

primary links 25-2

primary VLANs 19-1, 19-3

priority

HSRP 45-7

overriding CoS 18-6

trusting CoS 18-6

private VLAN edge ports

See protected ports

private VLANs

across multiple switches 19-4

and SDM template 19-4

and SVIs 19-5

benefits of 19-1

community ports 19-2

community VLANs 19-2, 19-3

configuration guidelines 19-6, 19-7, 19-8

configuration tasks 19-6

configuring 19-9

default configuration 19-6

end station access to 19-3

IP addressing 19-3

isolated port 19-2

isolated VLANs 19-2, 19-3

mapping 19-13

monitoring 19-14

ports

community 19-2

configuration guidelines 19-8

configuring host ports 19-11

configuring promiscuous ports 19-12

described 16-4

isolated 19-2

promiscuous 19-2

primary VLANs 19-1, 19-3

promiscuous ports 19-2

secondary VLANs 19-2

subdomains 19-1

traffic in 19-5

privileged EXEC mode 2-2

privilege levels

changing the default for lines 11-9

command switch 6-15

exiting 11-9

logging into 11-9

mapping on member switches 6-15

overview 11-2, 11-7

setting a command with 11-8

PROFINET 9-1

configuring 9-4

default configuration 9-4

displaying configuration 9-5

promiscuous ports

configuring 19-12

defined 19-2

protected ports 1-9, 29-6

protocol-dependent modules, EIGRP 41-34

Protocol-Independent Multicast Protocol

See PIM

provider edge devices 41-72

proxy ARP

configuring 41-10

definition 41-8

with IP routing disabled 41-11

proxy reports 25-3

pruning, VTP

disabling

in VTP domain 17-14

on a port 16-20

enabling

in VTP domain 17-14

on a port 16-20

examples 17-6

overview 17-5

pruning-eligible list

changing 16-20

for VTP pruning 17-5

VLANs 17-14

PTP 8-1

configuring 8-3

default configuration 8-2

displaying configuration 8-4

PVST+

described 21-9

IEEE 802.1Q trunking interoperability 21-10

instances supported 21-9

Q

QoS

and MQC commands 39-1

auto-QoS

categorizing traffic 39-21

configuration and defaults display 39-32

configuration guidelines 39-30

described 39-21

disabling 39-31

displaying generated commands 39-31

displaying the initial configuration 39-32

effects on running configuration 39-29

list of generated commands 39-23, 39-27

basic model 39-4

classification

class maps, described 39-8

defined 39-4

DSCP transparency, described 39-42

flowchart 39-7

forwarding treatment 39-3

in frames and packets 39-3

IP ACLs, described 39-6, 39-8

MAC ACLs, described 39-6, 39-8

options for IP traffic 39-6

options for non-IP traffic 39-6

policy maps, described 39-8

trust DSCP, described 39-6

trusted CoS, described 39-6

trust IP precedence, described 39-6

class maps

configuring 39-48

displaying 39-82

configuration guidelines

auto-QoS 39-30

standard QoS 39-35

configuring

aggregate policers 39-61

auto-QoS 39-21

default port CoS value 39-40

DSCP maps 39-63

DSCP transparency 39-42

DSCP trust states bordering another domain 39-42

egress queue characteristics 39-74

ingress queue characteristics 39-70

IP extended ACLs 39-46

IP standard ACLs 39-45

MAC ACLs 39-47

policy maps, hierarchical 39-54

port trust states within the domain 39-38

trusted boundary 39-40

default auto configuration 39-21

default standard configuration 39-33

displaying statistics 39-82

DSCP transparency 39-42

egress queues

allocating buffer space 39-75

buffer allocation scheme, described 39-18

configuring shaped weights for SRR 39-79

configuring shared weights for SRR 39-80

described 39-5

displaying the threshold map 39-78

flowchart 39-18

mapping DSCP or CoS values 39-77

scheduling, described 39-5

setting WTD thresholds 39-75

WTD, described 39-19

enabling globally 39-37

flowcharts

classification 39-7

egress queueing and scheduling 39-18

ingress queueing and scheduling 39-16

policing and marking 39-11

implicit deny 39-8

ingress queues

allocating bandwidth 39-72

allocating buffer space 39-71

buffer and bandwidth allocation, described 39-17

configuring shared weights for SRR 39-72

configuring the priority queue 39-73

described 39-4

displaying the threshold map 39-71

flowchart 39-16

mapping DSCP or CoS values 39-70

priority queue, described 39-17

scheduling, described 39-4

setting WTD thresholds 39-70

WTD, described 39-17

IP phones

automatic classification and queueing 39-21

detection and trusted settings 39-21, 39-40

limiting bandwidth on egress interface 39-81

mapping tables

CoS-to-DSCP 39-64

displaying 39-82

DSCP-to-CoS 39-67

DSCP-to-DSCP-mutation 39-68

IP-precedence-to-DSCP 39-65

policed-DSCP 39-66

types of 39-13

marked-down actions 39-52, 39-58

marking, described 39-4, 39-9

overview 39-1

packet modification 39-20

policers

configuring 39-52, 39-58, 39-62

described 39-9

displaying 39-82

number of 39-36

types of 39-10

policies, attaching to an interface 39-9

policing

described 39-4, 39-9

token bucket algorithm 39-10

policy maps

characteristics of 39-50

displaying 39-83

hierarchical 39-9

hierarchical on SVIs 39-54

nonhierarchical on physical ports 39-50

QoS label, defined 39-4

queues

configuring egress characteristics 39-74

configuring ingress characteristics 39-70

high priority (expedite) 39-20, 39-81

location of 39-14

SRR, described 39-15

WTD, described 39-14

rewrites 39-20

support for 1-11

trust states

bordering another domain 39-42

described 39-6

trusted device 39-40

within the domain 39-38

quality of service

See QoS

queries, IGMP 28-4

query solicitation, IGMP 28-13

R

RADIUS

attributes

vendor-proprietary 11-36

vendor-specific 11-34

configuring

accounting 11-33

authentication 11-28

authorization 11-32

communication, global 11-26, 11-34

communication, per-server 11-26

multiple UDP ports 11-26

default configuration 11-25

defining AAA server groups 11-30

displaying the configuration 11-38

identifying the server 11-26

in clusters 6-14

limiting the services to the user 11-32

method list, defined 11-25

operation of 11-19

overview 11-18

server load balancing 11-38

suggested network environments 11-18

support for 1-11

tracking services accessed by user 11-33

RADIUS Change of Authorization 11-19

range

macro 14-11

of interfaces 14-9

rapid convergence 22-10

rapid per-VLAN spanning-tree plus

See rapid PVST+

rapid PVST+

described 21-9

IEEE 802.1Q trunking interoperability 21-10

instances supported 21-9

Rapid Spanning Tree Protocol

See RSTP

RARP 41-8

rcommand command 6-14

RCP

configuration files

downloading B-18

overview B-17

preparing the server B-17

uploading B-19

image files

deleting old image B-37

downloading B-35

preparing the server B-34

uploading B-37

reachability, tracking IP SLAs IP host 47-9

readiness check

port-based authentication

configuring 12-37

described 12-16, 12-37

real-time clock synchronization 8-1

reconfirmation interval, VMPS, changing 16-28

reconfirming dynamic VLAN membership 16-28

recovery procedures 52-1

redirect URL 12-18, 12-20, 12-61

redundancy

EtherChannel 40-3

HSRP 45-1

STP

backbone 21-8

path cost 16-23

port priority 16-21

redundant links and UplinkFast 23-13

reliable transport protocol, EIGRP 41-33

reloading software 4-22

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

Remote SPAN

See RSPAN

remote SPAN 30-2

REP

administrative VLAN 24-8

administrative VLAN, configuring 24-8

age timer 24-8

and STP 24-6

configuration guidelines 24-7

configuring interfaces 24-9

convergence 24-4

default configuration 24-7

manual preemption, configuring 24-13

monitoring 24-13

neighbor offset numbers 24-4

open segment 24-2

ports 24-6

preempt delay time 24-5

primary edge port 24-4

ring segment 24-2

secondary edge port 24-4

segments 24-1

characteristics 24-2

SNMP traps, configuring 24-13

supported interfaces 24-1

triggering VLAN load balancing 24-5

verifying link integrity 24-3

VLAN blocking 24-12

VLAN load balancing 24-4

report suppression, IGMP

described 28-6

disabling 28-15, 43-11

resequencing ACL entries 38-14

reserved addresses in DHCP pools 26-26

resets, in BGP 41-48

resetting a UDLD-shutdown interface 33-6

Resilient Ethernet Protocol

See REP

responder, IP SLAs

described 46-4

enabling 46-8

response time, measuring with IP SLAs 46-4

restricted VLAN

configuring 12-52

described 12-22

using with IEEE 802.1x 12-22

restricting access

NTP services 7-8

overview 11-1

passwords and privilege levels 11-2

RADIUS 11-17

TACACS+ 11-10

retry count, VMPS, changing 16-29

reverse address resolution 41-8

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP 41-18

1112, IP multicast and IGMP 28-2

1157, SNMPv1 36-2

1163, BGP 41-40

1166, IP addresses 41-5

1253, OSPF 41-24

1267, BGP 41-40

1305, NTP 7-2

1587, NSSAs 41-24

1757, RMON 34-2

1771, BGP 41-40

1901, SNMPv2C 36-2

1902 to 1907, SNMPv2 36-2

2236, IP multicast and IGMP 28-2

2273-2275, SNMPv3 36-2

RFC 5176 Compliance 11-20

RIP

advertisements 41-18

authentication 41-21

configuring 41-20

default configuration 41-19

described 41-18

for IPv6 42-7

hop counts 41-19

split horizon 41-22

summary addresses 41-22

support for 1-13

RMON

default configuration 34-3

displaying status 34-7

enabling alarms and events 34-3

groups supported 34-2

overview 34-1

statistics

collecting group Ethernet 34-6

collecting group history 34-5

support for 1-14

root guard

described 23-8

enabling 23-15

support for 1-7

root switch

MSTP 22-18

STP 21-14

route calculation timers, OSPF 41-30

route dampening, BGP 41-59

routed packets, ACLs on 38-39

routed ports

configuring 41-3

defined 14-4

in switch clusters 6-8

IP addresses on 14-21, 41-3

route-map command 41-95

route maps

BGP 41-51

policy-based routing 41-93

router ACLs

defined 38-2

types of 38-4

route reflectors, BGP 41-58

router ID, OSPF 41-31

route selection, BGP 41-49

route summarization, OSPF 41-29

route targets, VPN 41-73

routing

default 41-2

dynamic 41-3

redistribution of information 41-89

static 41-3

routing domain confederation, BGP 41-58

Routing Information Protocol

See RIP

routing protocol administrative distances 41-88

RSPAN

characteristics 30-8

configuration guidelines 30-15

default configuration 30-9

defined 30-2

destination ports 30-7

displaying status 30-22

interaction with other features 30-8

monitored ports 30-5

monitoring ports 30-7

overview 1-14, 30-1

received traffic 30-4

sessions

creating 30-16

defined 30-3

limiting source traffic to specific VLANs 30-21

specifying monitored ports 30-16

with ingress traffic enabled 30-19

source ports 30-5

transmitted traffic 30-5

VLAN-based 30-6

RSTP

active topology 22-9

BPDU

format 22-12

processing 22-13

designated port, defined 22-9

designated switch, defined 22-9

interoperability with IEEE 802.1D

described 22-8

restarting migration process 22-27

topology changes 22-13

overview 22-9

port roles

described 22-9

synchronized 22-11

proposal-agreement handshake process 22-10

rapid convergence

described 22-10

edge ports and Port Fast 22-10

point-to-point links 22-10, 22-26

root ports 22-10

root port, defined 22-9

See also MSTP

running configuration

replacing B-20, B-21

rolling back B-20, B-22

running configuration, saving 4-16

S

SC (standby command switch) 6-10

scheduled reloads 4-22

scheduling, IP SLAs operations 46-5

SCP

and SSH 11-54

configuring 11-54

SDM

templates

configuring 10-4

number of 10-1

SDM template 44-3

configuration guidelines 10-3

configuring 10-3

dual IPv4 and IPv6 10-2

types of 10-1

secondary edge port, REP 24-4

secondary VLANs 19-2

Secure Copy Protocol

secure HTTP client

configuring 11-53

displaying 11-54

secure HTTP server

configuring 11-52

displaying 11-54

secure MAC addresses

deleting 29-16

maximum number of 29-10

types of 29-9

secure ports, configuring 29-8

secure remote connections 11-44

Secure Shell

See SSH

Secure Socket Layer

See SSL

security, port 29-8

security features 1-8

See SCP

sequence numbers in log messages 35-8

server mode, VTP 17-3

service-provider network, MSTP and RSTP 22-1

service-provider networks

and customer VLANs 20-2

and IEEE 802.1Q tunneling 20-1

Layer 2 protocols across 20-8

Layer 2 protocol tunneling for EtherChannels 20-9

set-request operation 36-4

setting a secondary temperature threshold 3-6

setting power supply alarm options 3-5

setting the FCS error hysteresis threshold 3-8

setting the FCS error threshold 3-8

setup program

failed command switch replacement 52-6

replacing failed command switch 52-4

severity levels, defining in system messages 35-8

SFPs

monitoring status of 14-25, 52-8

security and identification 52-8

status, displaying 52-8

shaped round robin

See SRR

show access-lists hw-summary command 38-21

show alarm commands 3-12

show and more command output, filtering 2-9

show cdp traffic command 32-5

show cluster members command 6-14

show configuration command 14-20

show forward command 52-16

show interfaces command 14-17, 14-20

show interfaces switchport 25-4

show l2protocol command 20-13, 20-15

show lldp traffic command 31-11

show platform forward command 52-16

show running-config command

displaying ACLs 38-19, 38-20, 38-31, 38-34

interface description in 14-20

shutdown command on interfaces 14-26

shutdown threshold for Layer 2 protocol packets 20-11

Simple Network Management Protocol

See SNMP

small-frame arrival rate, configuring 29-5

Smartports macros

applying Cisco-default macros 15-3

applying global parameter values 15-3

configuration guidelines 15-2

default configuration 15-1

displaying 15-5

tracing 15-2

SNAP 32-1

SNMP

accessing MIB variables with 36-4

agent

described 36-4

disabling 36-7

and IP SLAs 46-2

authentication level 36-10

community strings

configuring 36-8

for cluster switches 36-4

overview 36-4

configuration examples 36-17

default configuration 36-6

engine ID 36-7

groups 36-7, 36-9

host 36-7

ifIndex values 36-5

in-band management 1-6

in clusters 6-14

informs

and trap keyword 36-12

described 36-5

differences from traps 36-5

disabling 36-15

enabling 36-15

limiting access by TFTP servers 36-16

limiting system log messages to NMS 35-10

manager functions 1-4, 36-3

managing clusters with 6-15

MIBs

location of A-4

supported A-1

notifications 36-5

overview 36-1, 36-4

security levels 36-2

setting CPU threshold notification 36-15

status, displaying 36-18

system contact and location 36-16

trap manager, configuring 36-13

traps

described 36-3, 36-5

differences from informs 36-5

disabling 36-15

enabling 36-12

enabling MAC address notification 7-22, 7-24, 7-25

overview 36-1, 36-4

types of 36-12

users 36-7, 36-9

versions supported 36-2

SNMP and Syslog Over IPv6 42-7

SNMP traps

REP 24-13

SNMPv1 36-2

SNMPv2C 36-2

SNMPv3 36-2

snooping, IGMP 28-2

software images

location in flash B-25

recovery procedures 52-2

scheduling reloads 4-23

tar file format, described B-26

See also downloading and uploading

source addresses

in IPv4 ACLs 38-11

in IPv6 ACLs 44-5

source-and-destination-IP address based forwarding, EtherChannel 40-8

source-and-destination MAC address forwarding, EtherChannel 40-8

source-IP address based forwarding, EtherChannel 40-8

source-MAC address forwarding, EtherChannel 40-7

Source-specific multicast

See SSM

SPAN

configuration guidelines 30-10

default configuration 30-9

destination ports 30-7

displaying status 30-22

interaction with other features 30-8

monitored ports 30-5

monitoring ports 30-7

overview 1-14, 30-1

ports, restrictions 29-12

received traffic 30-4

sessions

configuring ingress forwarding 30-14, 30-20

creating 30-11

defined 30-3

limiting source traffic to specific VLANs 30-14

removing destination (monitoring) ports 30-12

specifying monitored ports 30-11

with ingress traffic enabled 30-13

source ports 30-5

transmitted traffic 30-5

VLAN-based 30-6

spanning tree and native VLANs 16-16

Spanning Tree Protocol

See STP

SPAN traffic 30-4

split horizon, RIP 41-22

SRR

configuring

shaped weights on egress queues 39-79

shared weights on egress queues 39-80

shared weights on ingress queues 39-72

described 39-15

shaped mode 39-15

shared mode 39-15

support for 1-12

SSH

configuring 11-45

cryptographic software image 11-43

described 1-6, 11-44

encryption methods 11-44

user authentication methods, supported 11-44

SSL

configuration guidelines 11-50

configuring a secure HTTP client 11-53

configuring a secure HTTP server 11-51

cryptographic software image 11-47

described 11-47

monitoring 11-54

SSM

address management restrictions 49-15

CGMP limitations 49-15

components 49-13

configuration guidelines 49-15

configuring 49-13, 49-16

differs from Internet standard multicast 49-13

IGMP snooping 49-15

IGMPv3 49-13

IGMPv3 Host Signalling 49-14

IP address range 49-14

monitoring 49-16

operations 49-14

PIM 49-13

state maintenance limitations 49-15

SSM mapping 49-16

configuration guidelines 49-17

configuring 49-16, 49-19

DNS-based 49-18, 49-19

monitoring 49-21

overview 49-17

restrictions 49-17

static 49-17, 49-19

static traffic forwarding 49-21

stacks, switch

MSTP instances supported 21-9

standby command switch

configuring

considerations 6-11

defined 6-2

priority 6-10

requirements 6-3

virtual IP address 6-11

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

standby ip command 45-6

standby links 25-2

standby router 45-1

standby timers, HSRP 45-10

startup configuration

booting

manually 4-19

specific image 4-20

clearing B-20

configuration file

automatically downloading 4-19

specifying the filename 4-19

static access ports

assigning to VLAN 16-9

defined 14-3, 16-3

static addresses

See addresses

static IP routing 1-13

static MAC addressing 1-9

static route primary interface,configuring 47-10

static routes

configuring 41-87

configuring for IPv6 42-19

understanding 42-6

static routing 41-3

static routing support, enhanced object tracking 47-10

static SSM mapping 49-17, 49-19

static traffic forwarding 49-21

static VLAN membership 16-2

statistics

802.1X 13-17

802.1x 12-67

CDP 32-5

interface 14-25

IP multicast routing 49-61

LLDP 31-10

LLDP-MED 31-10

NMSP 31-10

OSPF 41-32

QoS ingress and egress 39-82

RMON group Ethernet 34-6

RMON group history 34-5

SNMP input and output 36-18

VTP 17-16

sticky learning 29-9

storm control

configuring 29-3

described 29-1

disabling 29-5

displaying 29-19

support for 1-3

thresholds 29-1

STP

accelerating root port selection 23-4

and REP 24-6

BackboneFast

described 23-5

disabling 23-14

enabling 23-13

BPDU filtering

described 23-3

disabling 23-12

enabling 23-12

BPDU guard

described 23-2

disabling 23-12

enabling 23-11

BPDU message exchange 21-3

configuration guidelines 21-12, 23-10

configuring

forward-delay time 21-21

hello time 21-20

maximum aging time 21-21

path cost 21-18

port priority 21-17

root switch 21-14

secondary root switch 21-16

spanning-tree mode 21-13

switch priority 21-19

transmit hold-count 21-22

counters, clearing 21-22

default configuration 21-11

default optional feature configuration 23-9

designated port, defined 21-3

designated switch, defined 21-3

detecting indirect link failures 23-5

disabling 21-14

displaying status 21-22

EtherChannel guard

described 23-7

disabling 23-14

enabling 23-14

extended system ID

effects on root switch 21-14

effects on the secondary root switch 21-16

overview 21-4

unexpected behavior 21-15

features supported 1-7

IEEE 802.1D and bridge ID 21-4

IEEE 802.1D and multicast addresses 21-8

IEEE 802.1t and VLAN identifier 21-4

inferior BPDU 21-3

instances supported 21-9

interface state, blocking to forwarding 23-2

interface states

blocking 21-5

disabled 21-7

forwarding 21-5, 21-6

learning 21-6

listening 21-6

overview 21-4

interoperability and compatibility among modes 21-10

Layer 2 protocol tunneling 20-7

limitations with IEEE 802.1Q trunks 21-10

load sharing

overview 16-21

using path costs 16-23

using port priorities 16-21

loop guard

described 23-9

enabling 23-15

modes supported 21-9

multicast addresses, effect of 21-8

optional features supported 1-7

overview 21-2

path costs 16-23

Port Fast

described 23-2

enabling 23-10

port priorities 16-22

preventing root switch selection 23-8

protocols supported 21-9

redundant connectivity 21-8

root guard

described 23-8

enabling 23-15

root port, defined 21-3

root switch

configuring 21-15

effects of extended system ID 21-4, 21-14

election 21-3

unexpected behavior 21-15

shutdown Port Fast-enabled port 23-2

status, displaying 21-22

superior BPDU 21-3

timers, described 21-20

UplinkFast

described 23-3

enabling 23-13

VLAN-bridge 21-10

stratum, NTP 7-2

stub areas, OSPF 41-28

stub routing, EIGRP 41-38

subdomains, private VLAN 19-1

subnet mask 41-5

subnet zero 41-6

success response, VMPS 16-25

summer time 7-13

SunNet Manager 1-4

supernet 41-6

supported port-based authentication methods 12-7

SVI autostate exclude

configuring 14-22

defined 14-5

SVI link state 14-5

SVIs

and IP unicast routing 41-3

and router ACLs 38-4

connecting VLANs 14-6

defined 14-4

routing between VLANs 16-2

switch 42-2

switch clustering technology 6-1

See also clusters, switch

switch console port 1-6

Switch Database Management

See SDM

switched packets, ACLs on 38-38

Switched Port Analyzer

See SPAN

switched ports 14-2

switchport backup interface 25-4, 25-5

switchport block multicast command 29-8

switchport block unicast command 29-8

switchport command 14-13

switchport mode dot1q-tunnel command 20-6

switchport protected command 29-7

switch priority

MSTP 22-23

STP 21-19

switch software features 1-1

switch virtual interface

See SVI

synchronization, BGP 41-45

synchronization, real-time clocks 8-1

syslog

See system message logging

system capabilities TLV 31-2

system clock

configuring

daylight saving time 7-13

manually 7-11

summer time 7-13

time zones 7-12

displaying the time and date 7-12

overview 7-1

See also NTP

system description TLV 31-2

system message logging

default configuration 35-3

defining error message severity levels 35-8

disabling 35-4

displaying the configuration 35-13

enabling 35-4

facility keywords, described 35-13

level keywords, described 35-9

limiting messages 35-10

message format 35-2

overview 35-1

sequence numbers, enabling and disabling 35-8

setting the display destination device 35-5

synchronizing log messages 35-6

syslog facility 1-14

time stamps, enabling and disabling 35-7

UNIX syslog servers

configuring the daemon 35-12

configuring the logging facility 35-12

facilities supported 35-13

system MTU

and IS-IS LSPs 41-66

system MTU and IEEE 802.1Q tunneling 20-5

system name

default configuration 7-15

default setting 7-15

manual configuration 7-15

See also DNS

system name TLV 31-2

system prompt, default setting 7-14, 7-15

system resources, optimizing 10-1

system routing

IS-IS 41-61

ISO IGRP 41-61

T

TACACS+

accounting, defined 11-11

authentication, defined 11-11

authorization, defined 11-11

configuring

accounting 11-17

authentication key 11-13

authorization 11-16

login authentication 11-14

default configuration 11-13

displaying the configuration 11-17

identifying the server 11-13

in clusters 6-14

limiting the services to the user 11-16

operation of 11-12

overview 11-10

support for 1-10

tracking services accessed by user 11-17

tagged packets

IEEE 802.1Q 20-3

Layer 2 protocol 20-7

tar files

creating B-6

displaying the contents of B-7

extracting B-8

image file format B-26

TCL script, registering and defining with embedded event manager 37-6

TDR 1-14

Telnet

accessing management interfaces 2-9

number of connections 1-6

setting a password 11-6

temperature alarms, configuring 3-6

temporary self-signed certificate 11-48

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password 11-6

TFTP

configuration files

downloading B-12

preparing the server B-11

uploading B-13

configuration files in base directory 4-7

configuring for autoconfiguration 4-7

image files

deleting B-29

downloading B-27

preparing the server B-27

uploading B-29

limiting access by servers 36-16

TFTP server 1-5

threshold, traffic level 29-2

threshold monitoring, IP SLAs 46-6

time

See NTP and system clock

Time Domain Reflector

See TDR

time-range command 38-16

time ranges in ACLs 38-16

time stamps in log messages 35-7

time zones 7-12

TLVs

defined 31-1

LLDP 31-2

LLDP-MED 31-2

Token Ring VLANs

support for 16-6

VTP support 17-4

ToS 1-11

traceroute, Layer 2

and ARP 52-11

and CDP 52-10

broadcast traffic 52-10

described 52-10

IP addresses and subnets 52-11

MAC addresses and VLANs 52-11

multicast traffic 52-11

multiple devices on a port 52-11

unicast traffic 52-10

usage guidelines 52-10

traceroute command 52-12

See also IP traceroute

tracked lists

configuring 47-3

types 47-3

tracked objects

by Boolean expression 47-4

by threshold percentage 47-6

by threshold weight 47-5

tracking interface line-protocol state 47-2

tracking IP routing state 47-2

tracking objects 47-1

tracking process 47-1

track state, tracking IP SLAs 47-9

traffic

blocking flooded 29-8

fragmented 38-5

fragmented IPv6 44-2

unfragmented 38-5

traffic policing 1-12

traffic suppression 29-1

transmit hold-count

see STP

transparent mode, VTP 17-3

trap-door mechanism 4-2

traps

configuring MAC address notification 7-22, 7-24, 7-25

configuring managers 36-12

defined 36-3

enabling 7-22, 7-24, 7-25, 36-12

notification types 36-12

overview 36-1, 36-4

triggering alarm options

configurable relays 3-3

methods 3-3

SNMP traps 3-3

syslog messages 3-4

troubleshooting

connectivity problems 52-8, 52-10, 52-11

CPU utilization 52-19

detecting unidirectional links 33-1

displaying crash information 52-18

PIMv1 and PIMv2 interoperability problems 49-34

setting packet forwarding 52-16

SFP security and identification 52-8

show forward command 52-16

with CiscoWorks 36-4

with debug commands 52-14

with ping 52-9

with system message logging 35-1

with traceroute 52-12

trunk failover

See link-state tracking

trunking encapsulation 1-8

trunk ports

configuring 16-18

defined 14-3, 16-3

trunks

allowed-VLAN list 16-19

load sharing

setting STP path costs 16-23

using STP port priorities 16-21, 16-22

native VLAN for untagged traffic 16-20

parallel 16-23

pruning-eligible list 16-20

to non-DTP device 16-15

trusted boundary for QoS 39-40

trusted port states

between QoS domains 39-42

classification options 39-6

ensuring port security for IP phones 39-40

support for 1-12

within a QoS domain 39-38

trustpoints, CA 11-48

tunneling

defined 20-1

IEEE 802.1Q 20-1

Layer 2 protocol 20-8

tunnel ports

defined 16-4

described 14-3, 20-1

IEEE 802.1Q, configuring 20-6

incompatibilities with other features 20-5

twisted-pair Ethernet, detecting unidirectional links 33-1

type of service

See ToS

U

UDLD

configuration guidelines 33-4

default configuration 33-4

disabling

globally 33-5

on fiber-optic interfaces 33-5

per interface 33-5

echoing detection mechanism 33-2

enabling

globally 33-5

per interface 33-5

Layer 2 protocol tunneling 20-10

link-detection mechanism 33-1

neighbor database 33-2

overview 33-1

resetting an interface 33-6

status, displaying 33-6

support for 1-7

UDP, configuring 41-14

UDP jitter, configuring 46-10

UDP jitter operation, IP SLAs 46-9

unauthorized ports with IEEE 802.1x 12-10

unicast MAC address filtering 1-5

and adding static addresses 7-28

and broadcast MAC addresses 7-27

and CPU packets 7-27

and multicast addresses 7-27

and router MAC addresses 7-27

configuration guidelines 7-27

described 7-27

unicast storm 29-1

unicast storm control command 29-4

unicast traffic, blocking 29-8

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration 35-12

facilities supported 35-13

message logging configuration 35-12

unrecognized Type-Length-Value (TLV) support 17-4

upgrading software images

See downloading

UplinkFast

described 23-3

disabling 23-13

enabling 23-13

support for 1-7

uploading

configuration files

preparing B-11, B-14, B-17

reasons for B-9

using FTP B-16

using RCP B-19

using TFTP B-13

image files

preparing B-27, B-30, B-34

reasons for B-25

using FTP B-33

using RCP B-37

using TFTP B-29

User Datagram Protocol

See UDP

user EXEC mode 2-2

username-based authentication 11-6

V

version-dependent transparent mode 17-4

virtual IP address

cluster standby group 6-11

command switch 6-11

Virtual Private Network

See VPN

virtual router 45-1, 45-2

virtual switches and PAgP 40-5

vlan.dat file 16-5

VLAN 1, disabling on a trunk port 16-19

VLAN 1 minimization 16-19

VLAN ACLs

See VLAN maps

vlan-assignment response, VMPS 16-25

VLAN blocking, REP 24-12

VLAN configuration

at bootup 16-7

saving 16-7

VLAN configuration mode 2-2

VLAN database

and startup configuration file 16-7

and VTP 17-1

VLAN configuration saved in 16-7

VLANs saved in 16-4

vlan dot1q tag native command 20-4

VLAN filtering and SPAN 30-6

vlan global configuration command 16-7

VLAN ID, discovering 7-30

VLAN link state 14-5

VLAN load balancing

REP 24-4

VLAN load balancing, triggering 24-5

VLAN load balancing on flex links 25-2

configuration guidelines 25-8

VLAN management domain 17-2

VLAN Management Policy Server

See VMPS

VLAN map entries, order of 38-30

VLAN maps

applying 38-34

common uses for 38-34

configuration guidelines 38-30

configuring 38-29

creating 38-31

defined 38-2

denying access to a server example 38-35

denying and permitting packets 38-31

displaying 38-41

examples of ACLs and VLAN maps 38-32

removing 38-34

support for 1-9

wiring closet configuration example 38-35

VLAN membership

confirming 16-28

modes 16-3

VLAN Query Protocol

See VQP

VLANs

adding 16-8

adding to VLAN database 16-8

aging dynamic addresses 21-9

allowed on trunk 16-19

and spanning-tree instances 16-3, 16-6, 16-11

configuration guidelines, extended-range VLANs 16-11

configuration guidelines, normal-range VLANs 16-6

configuring 16-1

configuring IDs 1006 to 4094 16-11

connecting through SVIs 14-6

creating 16-8

customer numbering in service-provider networks 20-3

default configuration 16-7

deleting 16-9

described 14-2, 16-1

displaying 16-14

extended-range 16-1, 16-10

features 1-8

illustrated 16-2

internal 16-11

limiting source traffic with RSPAN 30-21

limiting source traffic with SPAN 30-14

modifying 16-8

multicast 28-17

native, configuring 16-20

normal-range 16-1, 16-4

number supported 1-8

parameters 16-5

port membership modes 16-3

static-access ports 16-9

STP and IEEE 802.1Q trunks 21-10

supported 16-2

Token Ring 16-6

traffic between 16-2

VLAN-bridge STP 21-10, 51-2

VTP modes 17-3

VLAN Trunking Protocol

See VTP

VLAN trunks 16-14

VMPS

administering 16-29

configuration example 16-30

configuration guidelines 16-26

default configuration 16-26

description 16-24

dynamic port membership

described 16-25

reconfirming 16-28

troubleshooting 16-30

entering server address 16-27

mapping MAC addresses to VLANs 16-25

monitoring 16-29

reconfirmation interval, changing 16-28

reconfirming membership 16-28

retry count, changing 16-29

voice aware 802.1x security

port-based authentication

configuring 12-38

described 12-30, 12-38

voice-over-IP 18-1

voice VLAN

Cisco 7960 phone, port connections 18-1

configuration guidelines 18-3

configuring IP phones for data traffic

override CoS of incoming frame 18-6

trust CoS priority of incoming frame 18-6

configuring ports for voice traffic in

802.1p priority tagged frames 18-5

802.1Q frames 18-5

connecting to an IP phone 18-4

default configuration 18-3

described 18-1

displaying 18-7

IP phone data traffic, described 18-2

IP phone voice traffic, described 18-2

VPN

configuring routing in 41-80

forwarding 41-73

in service provider networks 41-71

routes 41-72

VPN routing and forwarding table

See VRF

VQP 1-8, 16-24

VRF

defining 41-73

tables 41-71

VRF-aware services

ARP 41-77

configuring 41-76

ftp 41-79

HSRP 41-78

ping 41-77

RADIUS 41-78

SNMP 41-77

syslog 41-78

tftp 41-79

traceroute 41-79

VTP

adding a client to a domain 17-15

advertisements 16-16, 17-3, 17-4

and extended-range VLANs 16-3, 17-1

and normal-range VLANs 16-2, 17-1

client mode, configuring 17-12

configuration

guidelines 17-8

requirements 17-10

saving 17-8

configuration requirements 17-10

configuration revision number

guideline 17-15

resetting 17-16

consistency checks 17-4

default configuration 17-7

described 17-1

domain names 17-8

domains 17-2

Layer 2 protocol tunneling 20-7

modes

client 17-3

off 17-3

server 17-3

transitions 17-3

transparent 17-3

monitoring 17-16

passwords 17-8

pruning

disabling 17-14

enabling 17-14

examples 17-6

overview 17-5

support for 1-8

pruning-eligible list, changing 16-20

server mode, configuring 17-10, 17-13

statistics 17-16

support for 1-8

Token Ring support 17-4

transparent mode, configuring 17-10

using 17-1

Version

enabling 17-13

version, guidelines 17-9

Version 1 17-4

Version 2

configuration guidelines 17-9

overview 17-4

Version 3

overview 17-5

W

WCCP

authentication 48-3

configuration guidelines 48-5

default configuration 48-5

described 48-1

displaying 48-9

dynamic service groups 48-3

enabling 48-6

features unsupported 48-4

forwarding method 48-3

Layer-2 header rewrite 48-3

MD5 security 48-3

message exchange 48-2

monitoring and maintaining 48-9

negotiation 48-3

packet redirection 48-3

packet-return method 48-3

redirecting traffic received from a client 48-6

setting the password 48-6

unsupported WCCPv2 features 48-4

web authentication 12-16

configuring13-16to ??

described 1-8

web-based authentication

customizeable web pages 13-6

description 13-1

web-based authentication, interactions with other features 13-7

Web Cache Communication Protocol

See WCCP

weighted tail drop

See WTD

weight thresholds in tracked lists 47-5

wired location service

configuring 31-9

displaying 31-10

location TLV 31-3

understanding 31-3

wizards 1-2

WTD

described 39-14

setting thresholds

egress queue-sets 39-75

ingress queues 39-70

support for 1-12

X

Xmodem protocol 52-2