Sign In
Upload
Manuals
Brands
Cisco Manuals
Network Router
ME-3400-24TS-A
Cisco ME-3400-24TS-A Manuals
Manuals and User Guides for Cisco ME-3400-24TS-A. We have
2
Cisco ME-3400-24TS-A manuals available for free PDF download: Software Configuration Manual, Datasheet
Cisco ME-3400-24TS-A Software Configuration Manual (885 pages)
Ethernet Access Switch
Brand:
Cisco
| Category:
Network Router
| Size: 9.82 MB
Table of Contents
Table of Contents
4
Related Publications
34
Obtaining Documentation
35
Ordering Documentation
35
Product Documentation DVD
35
Cisco Product Security Overview
36
Documentation Feedback
36
Obtaining Technical Assistance
37
Reporting Security Problems in Cisco Products
37
Definitions of Service Request Severity
38
Submitting a Service Request
38
Obtaining Additional Publications and Information
39
Performance Features
42
Manageability Features
43
Management Options
43
Availability Features
44
Security Features
45
Switch Security
45
Vlan Features
45
Network Security
46
Quality of Service and Class of Service Features
46
Layer 2 Virtual Private Network Services
47
Layer 3 Features
47
Default Settings after Initial Switch Configuration
48
Network Configuration Examples
51
Multidwelling or Ethernet-To-The-Subscriber Network
51
Layer 2 VPN Application
53
Multi-VRF CE Application
54
Chapter 2 Using the Command-Line Interface
55
Where to Go Next
55
Understanding Command Modes
57
Understanding Abbreviated Commands
59
Understanding the Help System
59
Understanding CLI Error Messages
60
Understanding no and Default Forms of Commands
60
Using Command History
60
Changing the Command History Buffer Size
61
Recalling Commands
61
Disabling the Command History Feature
61
Using Editing Features
62
Enabling and Disabling Editing Features
62
Editing Commands through Keystrokes
62
Editing Command Lines that Wrap
64
Searching and Filtering Output of Show and more Commands
64
Accessing the CLI
65
Accessing the CLI through a Console Connection or through Telnet
65
Chapter 3 Assigning the Switch IP Address and Default Gateway
67
Understanding the Boot Process
67
Assigning Switch Information
68
Default Switch Information
69
Understanding DHCP-Based Autoconfiguration
69
DHCP Client Request Process
69
Configuring DHCP-Based Autoconfiguration
71
Configuring the TFTP Server
71
DHCP Server Configuration Guidelines
71
Configuring the DNS
72
Configuring the Relay Device
72
Obtaining Configuration Files
73
Example Configuration
74
Manually Assigning IP Information
75
Checking and Saving the Running Configuration
76
Modifying the Startup Configuration
78
Default Boot Configuration
79
Automatically Downloading a Configuration File
79
Specifying the Filename to Read and Write the System Configuration
79
Booting Manually
80
Booting a Specific Software Image
80
Controlling Environment Variables
81
Scheduling a Reload of the Software Image
82
Configuring a Scheduled Reload
83
Displaying Scheduled Reload Information
84
Chapter 4 Configuring Cisco IOS CNS Agents
85
Understanding Cisco Configuration Engine Software
85
Chapter 4 Configuring Cisco IO CN Agent
86
Configuration Service
86
Event Service
87
Namespace Mapper
87
What You Should Know about the CNS Ids and Device Hostnames
87
Configid
87
Deviceid
88
Hostname and Deviceid
88
Using Hostname, Deviceid, and Configid
88
Understanding Cisco IOS Agents
89
Initial Configuration
89
Incremental (Partial) Configuration
90
Synchronized Configuration
90
Configuring Cisco IOS Agents
90
Enabling Automated CNS Configuration
90
Enabling the CNS Event Agent
92
Enabling the Cisco IOS CNS Agent
93
Enabling an Initial Configuration
93
Enabling a Partial Configuration
95
Displaying CNS Configuration
96
Managing the System Time and Date
98
Chapter 5 Administering the Switch
99
Understanding the System Clock
99
Understanding Network Time Protocol
99
Configuring NTP
101
Default NTP Configuration
101
Configuring NTP Authentication
102
Configuring NTP Associations
103
Configuring NTP Broadcast Service
104
Configuring NTP Access Restrictions
105
Configuring the Source IP Address for NTP Packets
107
Configuring Time and Date Manually
108
Setting the System Clock
108
Configuring the Time Zone
109
Displaying the Time and Date Configuration
109
Configuring Summer Time (Daylight Saving Time)
110
Displaying the NTP Configuration
108
Configuring a System Name and Prompt
111
Configuring a System Name
112
Default System Name and Prompt Configuration
112
Understanding DNS
112
Default DNS Configuration
113
Setting up DNS
113
Table
113
Creating a Banner
114
Default Banner Configuration
114
Configuring a Message-Of-The-Day Login Banner
115
Configuring a Login Banner
116
Displaying the DNS Configuration
114
Managing the MAC Address Table
116
Building the Address Table
117
MAC Addresses and Vlans
117
Default MAC Address Table Configuration
118
Changing the Address Aging Time
118
Removing Dynamic Address Entries
119
Configuring MAC Address Notification Traps
119
Adding and Removing Static Address Entries
121
Configuring Unicast MAC Address Filtering
122
Disabling MAC Address Learning on a VLAN
123
Displaying Address Table Entries
125
Managing the ARP Table
125
Chapter 6 Configuring SDM Templates
126
Understanding the SDM Templates
126
Configuring the Switch SDM Template
127
Default SDM Template
127
SDM Template Configuration Guidelines
127
Setting the SDM Template
128
Displaying the SDM Templates
129
Chapter 7 Configuring Switch-Based Authentication
130
Preventing Unauthorized Access to Your Switch
130
Protecting Access to Privileged EXEC Commands
131
Default Password and Privilege Level Configuration
131
Setting or Changing a Static Enable Password
132
Protecting Enable and Enable Secret Passwords with Encryption
133
Disabling Password Recovery
134
Setting a Telnet Password for a Terminal Line
135
Configuring Username and Password Pairs
136
Configuring Multiple Privilege Levels
137
Setting the Privilege Level for a Command
137
Changing the Default Privilege Level for Lines
138
Logging into and Exiting a Privilege Level
139
Controlling Switch Access with TACACS
139
Understanding TACACS
139
TACACS+ Operation
141
Configuring TACACS
142
Default TACACS+ Configuration
142
Identifying the TACACS+ Server Host and Setting the Authentication Key
142
Configuring TACACS+ Login Authentication
143
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
145
Starting TACACS+ Accounting
146
Displaying the TACACS+ Configuration
146
Controlling Switch Access with RADIUS
147
Understanding RADIUS
147
RADIUS Operation
148
Configuring RADIUS
149
Default RADIUS Configuration
149
Identifying the RADIUS Server Host
149
Configuring RADIUS Login Authentication
152
Defining AAA Server Groups
154
Configuring RADIUS Authorization for User Privileged Access and Network Services
156
Starting RADIUS Accounting
157
Configuring Settings for All RADIUS Servers
158
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
158
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
160
Displaying the RADIUS Configuration
160
Controlling Switch Access with Kerberos
161
Understanding Kerberos
161
Kerberos Operation
163
Authenticating to a Boundary Switch
164
Authenticating to Network Services
164
Obtaining a TGT from a KDC
164
Configuring Kerberos
165
Configuring the Switch for Local Authentication and Authorization
165
Configuring the Switch for Secure Shell
166
Understanding SSH
167
Limitations
167
SSH Servers, Integrated Clients, and Supported Versions
167
Configuring SSH
168
Configuration Guidelines
168
Setting up the Switch to Run SSH
168
Configuring the SSH Server
169
Displaying the SSH Configuration and Status
170
Chapter 8 Configuring IEEE 802.1X Port-Based Authentication
172
Understanding IEEE 802.1X Port-Based Authentication
172
Device Roles
173
Authentication Initiation and Message Exchange
174
Ports in Authorized and Unauthorized States
175
IEEE 802.1X Accounting
176
IEEE 802.1X Accounting Attribute-Value Pairs
176
IEEE 802.1X Host Mode
177
Figure
178
Using IEEE 802.1X with Port Security
178
Using IEEE 802.1X with VLAN Assignment
179
Configuring IEEE 802.1X Authentication
180
Default IEEE 802.1X Configuration
180
Default IEEE 802.1X Configuration
181
IEEE 802.1X Configuration Guidelines
181
Configuring IEEE 802.1X Authentication
182
Configuring the Switch-To-RADIUS-Server Communication
183
Configuring Periodic Re-Authentication
184
Manually Re-Authenticating a Client Connected to a Port
185
Changing the Quiet Period
185
Changing the Switch-To-Client Retransmission Time
186
Setting the Switch-To-Client Frame-Retransmission Number
186
Setting the Re-Authentication Number
187
Configuring the Host Mode
188
Resetting the IEEE 802.1X Configuration to the Default Values
188
Configuring IEEE 802.1X Accounting
189
Displaying IEEE 802.1X Statistics and Status
190
Understanding Interface Types
192
C H a P T E R 9 Configuring Interface Characteristics
193
Port-Based Vlans
193
Switch Ports
193
Access Ports
194
UNI and NNI Ports
194
Routed Ports
195
Trunk Ports
195
Tunnel Ports
195
Switch Virtual Interfaces
196
Connecting Interfaces
197
Etherchannel Port Groups
197
CHAPTER 9 Configuring Interface Characteristics
193
Understanding Interface Types
193
Using Interface Configuration Mode
198
Procedures for Configuring Interfaces
198
Configuring a Range of Interfaces
199
Configuring and Using Interface Range Macros
201
Configuring Ethernet Interfaces
202
Default Ethernet Interface Configuration
203
Configuring User Network and Network Node Interfaces
204
Configuring Interface Speed and Duplex Mode
205
Speed and Duplex Configuration Guidelines
206
Setting the Interface Speed and Duplex Parameters
206
Configuring IEEE 802.3X Flow Control
208
Configuring Auto-MDIX on an Interface
209
Adding a Description for an Interface
210
Configuring Layer 3 Interfaces
211
Configuring the System MTU
212
Monitoring and Maintaining the Interfaces
213
Monitoring Interface Status
214
Clearing and Resetting Interfaces and Counters
215
Shutting down and Restarting the Interface
215
Chapter 10 Configuring Command Macros
216
Understanding Command Macros
216
Configuring Command Macros
217
Default Command Macro Configuration
217
Command Macro Configuration Guidelines
217
Creating Command Macros
218
Applying Command Macros
219
Displaying Command Macros
220
Chapter 11 Configuring Vlans
222
Understanding Vlans
222
Supported Vlans
224
Normal-Range Vlans
224
Extended-Range Vlans
225
VLAN Port Membership Modes
225
UNI Vlans
226
Creating and Modifying Vlans
227
Default Ethernet VLAN Configuration
228
VLAN Configuration Guidelines
229
Creating or Modifying an Ethernet VLAN
230
Assigning Static-Access Ports to a VLAN
231
Creating an Extended-Range VLAN with an Internal VLAN ID
232
Configuring UNI Vlans
233
Configuration Guidelines
233
Configuring UNI Vlans
234
Configuring VLAN Trunks
235
Trunking Overview
235
Configuring an Ethernet Interface as a Trunk Port
237
Default Layer 2 Ethernet Interface VLAN Configuration
237
Interaction with Other Features
237
Configuring a Trunk Port
238
Defining the Allowed Vlans on a Trunk
238
Configuring the Native VLAN for Untagged Traffic
240
Configuring Trunk Ports for Load Sharing
240
Load Sharing Using STP Port Priorities
241
Load Sharing Using STP Path Cost
242
Table
235
Displaying Vlans
235
IEEE 802.1Q Configuration Considerations
236
Configuring VMPS
244
Understanding VMPS
244
Dynamic-Access Port VLAN Membership
245
Default VMPS Client Configuration
245
VMPS Configuration Guidelines
246
Configuring the VMPS Client
246
Entering the IP Address of the VMPS
246
Configuring Dynamic-Access Ports on VMPS Clients
247
Reconfirming VLAN Memberships
247
Changing the Reconfirmation Interval
248
Changing the Retry Count
248
Monitoring the VMPS
248
Troubleshooting Dynamic-Access Port VLAN Membership
249
VMPS Configuration Example
249
Understanding Private Vlans
252
Chapter 12 Configuring Private VLAN
253
Types of Private Vlans and Private-VLAN Ports
253
IP Addressing Scheme with Private Vlans
255
Private Vlans Across Multiple Switches
255
Private Vlans and Unicast, Broadcast, and Multicast Traffic
256
Private Vlans and Svis
256
Configuring Private Vlans
256
Tasks for Configuring Private Vlans
257
Default Private-VLAN Configuration
257
Private-VLAN Configuration Guidelines
257
Secondary and Primary VLAN Configuration
258
Private-VLAN Port Configuration
259
Limitations with Other Features
260
Configuring and Associating Vlans in a Private VLAN
261
Configuring a Layer 2 Interface as a Private-VLAN Host Port
263
Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port
264
Mapping Secondary Vlans to a Primary VLAN Layer 3 VLAN Interface
265
Monitoring Private Vlans
266
Chapter 13 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling
268
Understanding IEEE 802.1Q Tunneling
268
Configuring IEEE 802.1Q Tunneling
271
Default IEEE 802.1Q Tunneling Configuration
271
IEEE 802.1Q Tunneling Configuration Guidelines
271
Native Vlans
271
System MTU
272
IEEE 802.1Q Tunneling and Other Features
273
Configuring an IEEE 802.1Q Tunneling Port
273
Understanding Layer 2 Protocol Tunneling
275
Configuring Layer 2 Protocol Tunneling
277
Default Layer 2 Protocol Tunneling Configuration
278
Layer 2 Protocol Tunneling Configuration Guidelines
278
Configuring Layer 2 Protocol Tunneling
279
Configuring Layer 2 Tunneling for Etherchannels
281
Configuring the SP Edge Switch
281
Configuring the Customer Switch
282
Monitoring and Maintaining Tunneling Status
285
Configuring STP
286
Understanding Spanning-Tree Features
286
Chapter 14 Configuring STP
287
STP Overview
287
Spanning-Tree Topology and Bpdus
288
Bridge ID, Switch Priority, and Extended System ID
289
Spanning-Tree Interface States
289
Blocking State
291
Listening State
291
Learning State
291
Forwarding State
292
Disabled State
292
How a Switch or Port Becomes the Root Switch or Root Port
292
Spanning Tree and Redundant Connectivity
293
Spanning-Tree Address Management
293
Accelerated Aging to Retain Connectivity
294
Spanning-Tree Modes and Protocols
294
Supported Spanning-Tree Instances
295
Spanning-Tree Interoperability and Backward Compatibility
295
STP and IEEE 802.1Q Trunks
295
Configuring Spanning-Tree Features
296
Default Spanning-Tree Configuration
296
Spanning-Tree Configuration Guidelines
297
Changing the Spanning-Tree Mode
298
Disabling Spanning Tree
299
Configuring the Root Switch
299
Configuring a Secondary Root Switch
301
Configuring Port Priority
301
Configuring Path Cost
303
Configuring the Switch Priority of a VLAN
304
Configuring Spanning-Tree Timers
305
Configuring the Hello Time
305
Configuring the Forwarding-Delay Time for a VLAN
306
Configuring the Maximum-Aging Time for a VLAN
306
Displaying the Spanning-Tree Status
307
Chapter 15 Configuring MSTP
308
Understanding MSTP
309
Multiple Spanning-Tree Regions
309
IST, CIST, and CST
309
Operations between MST Regions
310
Operations Within an MST Region
310
Hop Count
311
Boundary Ports
312
Interoperability with IEEE 802.1D STP
312
Understanding RSTP
313
Port Roles and the Active Topology
313
Rapid Convergence
314
Synchronization of Port Roles
315
Bridge Protocol Data Unit Format and Processing
316
Processing Inferior BPDU Information
317
Processing Superior BPDU Information
317
Topology Changes
317
Configuring MSTP Features
318
Default MSTP Configuration
319
MSTP Configuration Guidelines
319
Specifying the MST Region Configuration and Enabling MSTP
320
Configuring the Root Switch
321
Configuring a Secondary Root Switch
323
Configuring Port Priority
324
Configuring Path Cost
325
Configuring the Switch Priority
326
Configuring the Hello Time
326
Configuring the Forwarding-Delay Time
327
Configuring the Maximum-Aging Time
328
Configuring the Maximum-Hop Count
328
Specifying the Link Type to Ensure Rapid Transitions
329
Restarting the Protocol Migration Process
329
Displaying the MST Configuration and Status
330
CHAPTER 16 Configuring Optional Spanning-Tree Features
332
Understanding Optional Spanning-Tree Features
332
Understanding Optional Spanning-Tree Features
333
Understanding Port Fast
333
Understanding BPDU Guard
333
Understanding BPDU Filtering
334
Understanding Etherchannel Guard
334
Understanding Root Guard
334
Configuring Optional Spanning-Tree Features
335
Default Optional Spanning-Tree Configuration
336
Enabling Port Fast
336
Optional Spanning-Tree Configuration Guidelines
336
Understanding Loop Guard
335
Enabling BPDU Guard
337
Enabling BPDU Filtering
338
Enabling Etherchannel Guard
339
Enabling Root Guard
340
Displaying the Spanning-Tree Status
341
Enabling Loop Guard
340
Chapter 17 Configuring Flex Links
342
Understanding Flex Links
342
Configuring Flex Links
343
Default Flex Link Configuration
343
Flex Link Configuration Guidelines
343
Configuring Flex Links
344
Monitoring Flex Links
345
CHAPTER 18 Configuring DHCP Features and IP Source Guard
346
Understanding DHCP Features
346
C H a P T E R 18 Configuring DHCP Features and IP Source Guard
347
DHCP Relay Agent
347
DHCP Server
347
DHCP Snooping
347
Option-82 Data Insertion
348
DHCP Snooping Binding Database
350
Configuring DHCP Features
351
Default DHCP Configuration
352
DHCP Snooping Configuration Guidelines
352
Configuring the DHCP Relay Agent
353
Specifying the Packet Forwarding Address
354
Enabling DHCP Snooping and Option 82
355
Enabling DHCP Snooping on Private Vlans
356
Enabling the DHCP Snooping Binding Database Agent
357
Displaying DHCP Snooping Information
358
Understanding IP Source Guard
358
Source IP Address Filtering
359
Source IP and MAC Address Filtering
359
Configuring IP Source Guard
359
Default IP Source Guard Configuration
359
IP Source Guard Configuration Guidelines
360
Enabling IP Source Guard
360
Displaying IP Source Guard Information
361
Chapter 19 Configuring Dynamic ARP Inspection
362
Understanding Dynamic ARP Inspection
362
Interface Trust States and Network Security
364
Rate Limiting of ARP Packets
365
Relative Priority of ARP Acls and DHCP Snooping Entries
365
Logging of Dropped Packets
365
Default Dynamic ARP Inspection Configuration
366
Dynamic ARP Inspection Configuration Guidelines
367
Configuring Dynamic ARP Inspection in DHCP Environments
368
Section on Page
368
Configuring ARP Acls for Non-DHCP Environments
369
Limiting the Rate of Incoming ARP Packets
371
Performing Validation Checks
373
Configuring the Log Buffer
374
Displaying Dynamic ARP Inspection Information
375
Understanding IGMP Snooping
378
Chapter 20 Configuring IGMP Snooping and MVR
379
IGMP Versions
379
Joining a Multicast Group
380
Leaving a Multicast Group
382
Immediate Leave
382
IGMP Configurable-Leave Timer
382
IGMP Report Suppression
383
Configuring IGMP Snooping
383
Default IGMP Snooping Configuration
383
Enabling or Disabling IGMP Snooping
384
Configuring a Multicast Router Port
385
Configuring a Host Statically to Join a Group
385
Enabling IGMP Immediate Leave
386
Configuring the IGMP Leave Timer
387
Configuring TCN-Related Commands
388
Controlling the Multicast Flooding Time after a TCN Event
388
Recovering from Flood Mode
388
Disabling Multicast Flooding During a TCN Event
389
Configuring the IGMP Snooping Querier
390
Disabling IGMP Report Suppression
391
Displaying IGMP Snooping Information
392
Understanding Multicast VLAN Registration
393
Using MVR in a Multicast Television Application
393
Configuring MVR
395
Default MVR Configuration
395
MVR Configuration Guidelines and Limitations
396
Configuring MVR Global Parameters
396
Configuring MVR Interfaces
397
Configuring IGMP Filtering and Throttling
399
Default IGMP Filtering and Throttling Configuration
400
Configuring IGMP Profiles
400
Applying IGMP Profiles
402
Setting the Maximum Number of IGMP Groups
402
Configuring the IGMP Throttling Action
403
Displaying MVR Information
399
Displaying IGMP Filtering and Throttling Configuration
405
CHAPTER 21 Configuring Port-Based Traffic Control
406
Configuring Storm Control
406
Understanding Storm Control
406
C H a P T E R 21 Configuring Port-Based Traffic Control
408
Default Storm Control Configuration
408
Configuring Storm Control and Threshold Levels
408
Configuring Protected Ports
410
Default Protected Port Configuration
410
Protected Port Configuration Guidelines
411
Configuring a Protected Port
411
Configuring Port Blocking
412
Default Port Blocking Configuration
412
Blocking Flooded Traffic on an Interface
412
Configuring Port Security
413
Understanding Port Security
413
Secure MAC Addresses
413
Security Violations
414
Default Port Security Configuration
415
Port Security Configuration Guidelines
415
Enabling and Configuring Port Security
416
Enabling and Configuring Port Security Aging
420
Displaying Port-Based Traffic Control Settings
422
Chapter 22 Configuring CDP
424
Understanding CDP
424
Configuring CDP
425
Default CDP Configuration
425
Configuring the CDP Characteristics
425
Disabling and Enabling CDP
426
Disabling and Enabling CDP on an Interface
427
Monitoring and Maintaining CDP
428
Chapter 23 Configuring UDLD
430
Understanding UDLD
430
Modes of Operation
430
Methods to Detect Unidirectional Links
431
Configuring UDLD
433
Default UDLD Configuration
433
Configuration Guidelines
433
Enabling UDLD Globally
434
Enabling UDLD on an Interface
434
Resetting an Interface Disabled by UDLD
435
Displaying UDLD Status
435
Chapter 24 Configuring SPAN and RSPAN
436
Understanding SPAN and RSPAN
436
Local SPAN
437
Remote SPAN
437
SPAN and RSPAN Concepts and Terminology
438
SPAN Sessions
438
Monitored Traffic
439
Source Ports
440
Source Vlans
441
VLAN Filtering
441
Destination Port
442
Rspan Vlan
443
SPAN and RSPAN Interaction with Other Features
443
Configuring SPAN and RSPAN
444
Default SPAN and RSPAN Configuration
445
Configuring Local SPAN
445
Creating a Local SPAN Session
445
Creating a Local SPAN Session and Configuring Ingress Traffic
445
SPAN Configuration Guidelines
445
Specifying Vlans to Filter
450
Configuring RSPAN
451
Configuring a VLAN as an RSPAN VLAN
451
RSPAN Configuration Guidelines
451
Creating an RSPAN Source Session
452
Creating an RSPAN Destination Session
454
Creating an RSPAN Destination Session and Configuring Ingress Traffic
455
Specifying Vlans to Filter
456
Displaying SPAN and RSPAN Status
457
Chapter 25 Configuring RMON
458
Understanding RMON
458
Configuring RMON
459
Default RMON Configuration
460
Configuring RMON Alarms and Events
460
Collecting Group History Statistics on an Interface
462
Collecting Group Ethernet Statistics on an Interface
463
Displaying RMON Status
463
Chapter 26 Configuring System Message Logging
464
Understanding System Message Logging
464
Configuring System Message Logging
465
System Log Message Format
465
Default System Message Logging Configuration
466
Disabling Message Logging
466
Setting the Message Display Destination Device
467
Synchronizing Log Messages
468
Enabling and Disabling Time Stamps on Log Messages
470
Enabling and Disabling Sequence Numbers in Log Messages
470
Defining the Message Severity Level
471
Limiting Syslog Messages Sent to the History Table and to SNMP
472
Configuring UNIX Syslog Servers
473
Logging Messages to a UNIX Syslog Daemon
473
Configuring the UNIX System Logging Facility
474
Displaying the Logging Configuration
475
Understanding SNMP
476
Chapter 27 Configuring SNMP
477
SNMP Versions
477
SNMP Manager Functions
478
SNMP Agent Functions
479
SNMP Community Strings
479
Using SNMP to Access MIB Variables
479
SNMP Notifications
480
SNMP Ifindex MIB Object Values
480
Configuring SNMP
480
Configuring SNMP
481
Default SNMP Configuration
481
SNMP Configuration Guidelines
481
Disabling the SNMP Agent
482
Configuring Community Strings
483
Configuring SNMP Groups and Users
484
Configuring SNMP Notifications
486
Setting the Agent Contact and Location Information
489
Limiting TFTP Servers Used through SNMP
490
SNMP Examples
490
Displaying SNMP Status
491
Chapter 28 Configuring Network Security with Acls
492
Understanding Acls
492
Supported Acls
493
Port Acls
494
Router Acls
495
VLAN Maps
496
Handling Fragmented and Unfragmented Traffic
496
Configuring Ipv4 Acls
497
Creating Standard and Extended Ipv4 Acls
498
ACL Logging
499
Ipv4 Access List Numbers
499
Creating a Numbered Standard ACL
500
Creating a Numbered Extended ACL
501
Creating Named Standard and Extended Acls
505
Resequencing Aces in an ACL
505
Using Time Ranges with Acls
507
Including Comments in Acls
509
Applying an Ipv4 ACL to a Terminal Line
509
Applying an Ipv4 ACL to an Interface
510
Hardware and Software Treatment of IP Acls
512
Ipv4 ACL Configuration Examples
512
Numbered Acls
514
Extended Acls
514
Named Acls
514
Time Range Applied to an IP ACL
515
Commented IP ACL Entries
515
ACL Logging
516
Creating Named MAC Extended Acls
517
Applying a MAC ACL to a Layer 2 Interface
519
Configuring VLAN Maps
520
VLAN Map Configuration Guidelines
521
Creating a VLAN Map
522
Examples of Acls and VLAN Maps
522
Applying a VLAN Map to a VLAN
524
Using VLAN Maps in Your Network
525
Wiring Closet Configuration
525
Denying Access to a Server on Another VLAN
526
Using VLAN Maps with Router Acls
527
VLAN Maps and Router ACL Configuration Guidelines
527
Examples of Router Acls and VLAN Maps Applied to Vlans
528
Acls and Switched Packets
528
Acls and Routed Packets
529
Acls and Multicast Packets
530
Displaying Ipv4 ACL Configuration
530
Chapter 29 Configuring Control-Plane Security
532
Understanding Control-Plane Security
532
Configuring Control-Plane Security
535
Monitoring Control-Plane Security
536
Monitoring Control-Plane Security
537
Chapter 30 Configuring Qos
538
Understanding Qos
538
Modular Qos CLI
540
Input and Output Policies
541
Input Policy Maps
541
Output Policy Maps
542
Classification
542
Class Maps
543
Classification Based on Layer 2 Cos
544
The Match Command
544
Classification Based on IP DSCP
545
Classification Based on IP Precedence
545
Classification Comparisons
546
Classification Based on Qos Acls
547
Classification Based on Qos Groups
547
Table Maps
548
Policing
549
Individual Policing
550
Aggregate Policing
551
Unconditional Priority Policing
552
Marking
553
Congestion Management and Scheduling
555
Traffic Shaping
556
Class-Based Weighted Fair Queuing
558
Priority Queuing
559
Congestion Avoidance and Queuing
561
Configuring Qos
563
Default Qos Configuration
564
Qos Configuration Guidelines
564
Using Acls to Classify Traffic
564
Creating IP Standard Acls
565
Creating IP Extended Acls
566
Creating Layer 2 MAC Acls
567
Using Class Maps to Define a Traffic Class
568
Configuring Table Maps
570
Attaching a Traffic Policy to an Interface
572
Configuring Input Policy Maps
572
Configuring Input Policy Maps with Individual Policing
573
Configuring Input Policy Maps with Aggregate Policing
576
Configuring Input Policy Maps with Marking
578
Configuring Output Policy Maps
580
Configuring Output Policy Maps with Class-Based-Weighted-Queuing
581
Configuring Output Policy Maps with Class-Based Shaping
583
Configuring Output Policy Maps with Port Shaping
584
Configuring Output Policy Maps with Class-Based Priority Queuing
585
Configuring Output Policy Maps with Weighted Tail Drop
590
Displaying Qos Information
592
Qos Statistics
592
Configuration Examples for Policy Maps
593
Qos Configuration for Customer a
593
Qos Configuration for Customer B
595
Modifying Output Policies and Adding or Deleting Classification Criteria
596
Modifying Output Policies and Adding or Deleting Configured Actions
597
Modifying Output Policies and Changing Queuing or Scheduling Parameters
597
Modifying Output Policies and Adding or Deleting a Class
598
Chapter 31 Configuring Etherchannels
602
Understanding Etherchannels
602
Etherchannel Overview
603
Port-Channel Interfaces
604
Port Aggregation Protocol
605
Pagp Interaction with Other Features
606
Pagp Modes
606
Link Aggregation Control Protocol
607
LACP Interaction with Other Features
607
LACP Modes
607
Etherchannel on Mode
608
Load Balancing and Forwarding Methods
608
Configuring Etherchannels
610
Default Etherchannel Configuration
610
Etherchannel Configuration Guidelines
611
Configuring Layer 2 Etherchannels
612
Configuring Layer 3 Etherchannels
614
Creating Port-Channel Logical Interfaces
614
Configuring the Physical Interfaces
615
Configuring Etherchannel Load Balancing
617
Configuring the Pagp Learn Method and Priority
618
Configuring LACP Hot-Standby Ports
619
Configuring the LACP System Priority
620
Configuring the LACP Port Priority
621
Displaying Etherchannel, Pagp, and LACP Status
622
Chapter 32 Configuring IP Unicast Routing
624
Understanding IP Routing
625
Types of Routing
625
Steps for Configuring Routing
626
Configuring IP Addressing
627
Default Addressing Configuration
627
Assigning IP Addresses to Network Interfaces
628
Classless Routing
629
Use of Subnet Zero
629
Configuring Address Resolution Methods
630
Define a Static ARP Cache
631
Set ARP Encapsulation
632
Enable Proxy ARP
633
Routing Assistance When IP Routing Is Disabled
633
Proxy ARP
633
Default Gateway
634
ICMP Router Discovery Protocol (IRDP)
634
Configuring Broadcast Packet Handling
635
Enabling Directed Broadcast-To-Physical Broadcast Translation
636
Forwarding UDP Broadcast Packets and Protocols
637
Establishing an IP Broadcast Address
638
Flooding IP Broadcasts
638
Monitoring and Maintaining IP Addressing
640
Enabling Ipv4 Unicast Routing
640
Configuring RIP
641
Default RIP Configuration
642
Configuring Basic RIP Parameters
642
Configuring RIP Authentication
644
Configuring Summary Addresses and Split Horizon
644
Configuring Split Horizon
646
Configuring OSPF
646
Default OSPF Configuration
647
Configuring Basic OSPF Parameters
649
Configuring OSPF Interfaces
649
Configuring OSPF Area Parameters
650
Configuring Other OSPF Parameters
652
Changing LSA Group Pacing
653
Configuring a Loopback Interface
654
Monitoring OSPF
654
Configuring EIGRP
655
Default EIGRP Configuration
657
Configuring Basic EIGRP Parameters
658
Configuring EIGRP Interfaces
659
Configuring EIGRP Route Authentication
660
Monitoring and Maintaining EIGRP
661
Configuring BGP
661
Default BGP Configuration
663
Enabling BGP Routing
665
Managing Routing Policy Changes
668
Configuring BGP Decision Attributes
669
Configuring BGP Filtering with Route Maps
671
Configuring BGP Filtering by Neighbor
672
Configuring Prefix Lists for BGP Filtering
673
Configuring BGP Community Filtering
674
Configuring BGP Neighbors and Peer Groups
675
Configuring Aggregate Addresses
677
Configuring Routing Domain Confederations
678
Configuring BGP Route Reflectors
679
Configuring Route Dampening
680
Monitoring and Maintaining BGP
681
Configuring Multi-VRF CE
682
Understanding Multi-VRF CE
682
Default Multi-VRF CE Configuration
684
Multi-VRF CE Configuration Guidelines
684
Configuring Vrfs
685
Configuring a VPN Routing Session
686
Configuring BGP PE to CE Routing Sessions
687
Multi-VRF CE Configuration Example
687
Displaying Multi-VRF CE Status
691
Configuring Protocol-Independent Features
692
Configuring Cisco Express Forwarding
692
Configuring the Number of Equal-Cost Routing Paths
693
Configuring Static Unicast Routes
694
Specifying Default Routes and Networks
695
Using Route Maps to Redistribute Routing Information
696
Configuring Policy-Based Routing
699
PBR Configuration Guidelines
700
Enabling PBR
701
Filtering Routing Information
702
Setting Passive Interfaces
702
Controlling Advertising and Processing in Routing Updates
703
Filtering Sources of Routing Information
704
Managing Authentication Keys
705
Monitoring and Maintaining the IP Network
706
Chapter 33 Configuring HSRP
708
Understanding HSRP
708
Multiple HSRP
710
Configuring HSRP
711
Default HSRP Configuration
711
HSRP Configuration Guidelines
712
Enabling HSRP
712
Configuring HSRP Priority
713
Configuring MHSRP
716
Configuring HSRP Authentication and Timers
716
Enabling HSRP Support for ICMP Redirect Messages
718
Displaying HSRP Configurations
718
Chapter 34 Configuring IP Multicast Routing
720
Understanding Cisco's Implementation of IP Multicast Routing
721
Understanding IGMP
721
IGMP Version 1
722
Understanding PIM
722
IGMP Version 2
722
PIM Versions
722
Auto-RP
723
PIM Modes
723
Bootstrap Router
724
Multicast Forwarding and Reverse Path Check
724
Configuring IP Multicast Routing
726
Default Multicast Routing Configuration
726
Multicast Routing Configuration Guidelines
726
Auto-RP and BSR Configuration Guidelines
727
Pimv1 and Pimv2 Interoperability
727
Configuring Basic Multicast Routing
728
Configuring a Rendezvous Point
729
Manually Assigning an RP to Multicast Groups
730
Configuring Auto-RP
731
Configuring Pimv2 BSR
735
Using Auto-RP and a BSR
739
Monitoring the RP Mapping Information
740
Troubleshooting Pimv1 and Pimv2 Interoperability Problems
740
Configuring Advanced PIM Features
740
Understanding PIM Shared Tree and Source Tree
740
Delaying the Use of PIM Shortest-Path Tree
742
Modifying the PIM Router-Query Message Interval
743
Configuring Optional IGMP Features
744
Default IGMP Configuration
744
Configuring the Switch as a Member of a Group
744
Controlling Access to IP Multicast Groups
745
Changing the IGMP Version
746
Modifying the IGMP Host-Query Message Interval
747
Changing the IGMP Query Timeout for Igmpv2
748
Changing the Maximum Query Response Time for Igmpv2
748
Configuring the Switch as a Statically Connected Member
749
Configuring Optional Multicast Routing Features
750
Configuring Sdr Listener Support
750
Enabling Sdr Listener Support
750
Limiting How Long an Sdr Cache Entry Exists
751
Configuring an IP Multicast Boundary
751
Monitoring and Maintaining IP Multicast Routing
753
Clearing Caches, Tables, and Databases
753
Displaying System and Network Statistics
753
Monitoring IP Multicast Routing
754
Advertisement
Cisco ME-3400-24TS-A Datasheet (22 pages)
Ethernet Access Switches
Brand:
Cisco
| Category:
Switch
| Size: 0.31 MB
Table of Contents
Cisco Me 3400 Series Ethernet Access Switches
1
Resilient Ethernet Protocol
5
Key Features and Benefits
7
Product Specifications
13
Power Specifications
14
Safety and Compliance
16
Ordering Information
16
Service and Support
20
Advertisement
Related Products
Cisco ME-3400-24TS-D
Cisco ME-3400G-12CS-D
Cisco MEM3725-32CF-INCL
Cisco MEM3745-256D-INCL
Cisco MEM3745-128D-INCL
Cisco MEM3745-128U192D
Cisco MEM3745-128U256D
Cisco MEM-7120/40-64S
Cisco MEM-7120/40-192S
Cisco MEM1600-2D
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL