Sign In
Upload
Manuals
Brands
Cisco Manuals
Switch
WS-C3750-48PS-S
Cisco WS-C3750-48PS-S Manuals
Manuals and User Guides for Cisco WS-C3750-48PS-S. We have
1
Cisco WS-C3750-48PS-S manual available for free PDF download: Software Configuration Manual
Cisco WS-C3750-48PS-S Software Configuration Manual (1010 pages)
Network Switch
Brand:
Cisco
| Category:
Switch
| Size: 11.68 MB
Table of Contents
Table of Contents
3
Obtaining Documentation
37
Ordering Documentation
38
Related Publications
37
Documentation Feedback
38
Obtaining Technical Assistance
38
Cisco Technical Support Website
39
Submitting a Service Request
39
Definitions of Service Request Severity
39
Obtaining Additional Publications and Information
40
Chapter 1 Overview
42
Features
42
Default Settings after Initial Switch Configuration
50
Default Settings after Initial Switch Configuration
51
Design Concepts for Using the Switch
52
Network Configuration Examples
52
Network Configuration Examples
53
Small to Medium-Sized Network Using Catalyst 3750 Switches
57
Large Network Using Catalyst 3750 Switches
58
Multidwelling Network Using Catalyst 3750 Switches
61
Chapter 4 Assigning the Switch IP Address and Default Gateway
63
Long-Distance, High-Bandwidth Transport Configuration
63
Where to Go Next
64
Understanding Command Modes
65
C H a P T E R 2 Using the Command-Line Interface
66
Understanding the Help System
67
Understanding Abbreviated Commands
67
Understanding no and Default Forms of Commands
68
Understanding CLI Error Messages
68
Using Command History
68
Changing the Command History Buffer Size
69
Disabling the Command History Feature
69
Recalling Commands
69
Editing Commands through Keystrokes
70
Enabling and Disabling Editing Features
70
Using Editing Features
70
Editing Command Lines that Wrap
72
Searching and Filtering Output of Show and more Commands
72
Accessing the CLI
73
Accessing the CLI through a Console Connection or through Telnet
73
Accessing the CLI from a Browser
74
Understanding CMS
75
Chapter 3 Getting Started with CM
76
Front Panel View
76
Topology View
76
CMS Menu Bar, Toolbar, and Feature Bar
76
Online Help
79
Configuration Modes
79
Guide Mode
79
Expert Mode
80
Wizards
80
Privilege Levels
81
Access to Older Switches in a Cluster
81
Configuring CMS
82
CMS Requirements
82
Minimum Hardware Configuration
82
Operating System and Browser Support
83
CMS Plug-In
83
Cross-Platform Considerations
83
HTTP Access to CMS
84
Specifying an HTTP Port (Nondefault Configuration Only)
84
Configuring an Authentication Method (Nondefault Configuration Only)
84
Displaying CMS
85
Launching CMS
85
Front Panel View
88
Topology View
89
CMS Icons
90
Where to Go Next
90
Understanding the Boot Process
91
Assigning Switch Information
92
Default Switch Information
93
Understanding DHCP-Based Autoconfiguration
93
DHCP Client Request Process
94
Configuring DHCP-Based Autoconfiguration
95
DHCP Server Configuration Guidelines
95
Configuring the TFTP Server
95
Configuring the DNS
96
Configuring the Relay Device
96
Obtaining Configuration Files
97
Example Configuration
98
Manually Assigning IP Information
100
Checking and Saving the Running Configuration
100
Modifying the Startup Configuration
101
Scheduling a Reload of the Software Image
106
Configuring a Scheduled Reload
106
Displaying Scheduled Reload Information
107
Default Boot Configuration
102
Automatically Downloading a Configuration File
102
Specifying the Filename to Read and Write the System Configuration
102
Booting Manually
103
Booting a Specific Software Image
103
Controlling Environment Variables
104
Managing Switch Stacks
109
Understanding Switch Stacks
109
Chapter 5 Managing Switch Stack
110
Switch Stack Membership
111
Stack Master Election and Re-Election
112
Switch Stack Bridge ID and Router MAC Address
113
Stack Member Numbers
114
Stack Member Priority Values
115
Switch Stack Offline Configuration
115
Effects of Adding a Provisioned Switch to a Switch Stack
116
Effects of Replacing a Provisioned Switch in a Switch Stack
118
Effects of Removing a Provisioned Switch from a Switch Stack
118
Hardware Compatibility in Switch Stacks
118
Software Compatibility in Switch Stacks
118
Compatibility Recommendations
119
Incompatible Software and Stack Member Image Upgrades
119
Stack Protocol Version Compatibility
119
Switch Stack Configuration Files
120
Additional Considerations for System-Wide Configuration on Switch Stacks
121
Switch Stack Management Connectivity
122
Connectivity to the Switch Stack through an IP Address
122
Connectivity to the Switch Stack through an SSH Session
122
Connectivity to the Switch Stack through Console Ports
122
Connectivity to Specific Stack Members
122
Switch Stack Configuration Scenarios
123
Assigning Stack Member Information
125
Default Switch Stack Configuration
125
Assigning a Stack Member Number
125
Setting the Stack Member Priority Value
126
Provisioning a New Member for a Switch Stack
126
Accessing the CLI of a Specific Stack Member
127
Displaying Switch Stack Information
128
Clustering Switches
129
Chapter 6 Clustering Switche
130
Understanding Switch Clusters
130
Cluster Command Switch Characteristics
131
Standby Cluster Command Switch Characteristics
131
Candidate Switch and Cluster Member Switch Characteristics
132
Planning a Switch Cluster
132
Automatic Discovery of Cluster Candidates and Members
133
Discovery through CDP Hops
133
Discovery through Non-CDP-Capable and Noncluster-Capable Devices
134
Discovery through Different Management Vlans
135
Discovery through Different Vlans
135
Discovery through Routed Ports
136
Discovery of Newly Installed Switches
137
HSRP and Standby Cluster Command Switches
138
Virtual IP Addresses
139
Other Considerations for Cluster Standby Groups
139
Automatic Recovery of Cluster Configuration
140
IP Addresses
141
Host Names
141
SNMP Community Strings
142
Switch Clusters and Switch Stacks
142
Passwords
142
TACACS+ and RADIUS
144
Access Modes in CMS
144
LRE Profiles
145
Verifying a Switch Cluster
150
Using the CLI to Manage Switch Clusters
151
Catalyst 1900 and Catalyst 2820 CLI Considerations
151
Using SNMP to Manage Switch Clusters
152
Managing the System Time and Date
153
Availability of Switch-Specific Features in Switch Clusters
145
Creating a Switch Cluster
145
Enabling a Cluster Command Switch
145
Adding Cluster Member Switches
146
Creating a Cluster Standby Group
148
Chapter 7 Administering the Switch
154
Understanding the System Clock
154
Understanding Network Time Protocol
154
Configuring NTP
156
Default NTP Configuration
156
Configuring NTP Authentication
157
Configuring NTP Associations
158
Configuring NTP Broadcast Service
159
Configuring NTP Access Restrictions
160
Configuring the Source IP Address for NTP Packets
162
Displaying the NTP Configuration
163
Configuring Time and Date Manually
163
Setting the System Clock
163
Displaying the Time and Date Configuration
164
Configuring the Time Zone
164
Configuring Summer Time (Daylight Saving Time)
165
Configuring a System Name and Prompt
166
Default System Name and Prompt Configuration
167
Configuring a System Name
167
Configuring a System Prompt
168
Understanding DNS
168
Default DNS Configuration
169
Setting up DNS
169
Displaying the DNS Configuration
170
Creating a Banner
170
Default Banner Configuration
170
Configuring a Message-Of-The-Day Login Banner
171
Configuring a Login Banner
172
Managing the MAC Address Table
172
Building the Address Table
173
MAC Addresses and Vlans
173
Managing the ARP Table
180
MAC Addresses and Switch Stacks
174
Default MAC Address Table Configuration
174
Changing the Address Aging Time
174
Removing Dynamic Address Entries
175
Configuring MAC Address Notification Traps
175
Adding and Removing Static Address Entries
177
Configuring Unicast MAC Address Filtering
178
Displaying Address Table Entries
180
Configuring SDM Templates
181
Understanding the SDM Templates
181
SDM Templates and Switch Stacks
182
Configuring the Switch SDM Template
183
Default SDM Template
183
SDM Template Configuration Guidelines
184
Setting the SDM Template
184
Displaying the SDM Templates
185
Chapter 9 Configuring Switch-Based Authentication
187
Preventing Unauthorized Access to Your Switch
187
Protecting Access to Privileged EXEC Commands
188
Default Password and Privilege Level Configuration
188
Setting or Changing a Static Enable Password
189
Protecting Enable and Enable Secret Passwords with Encryption
190
Disabling Password Recovery
191
Setting a Telnet Password for a Terminal Line
192
Configuring Username and Password Pairs
193
Configuring Multiple Privilege Levels
194
Setting the Privilege Level for a Command
194
Changing the Default Privilege Level for Lines
195
Logging into and Exiting a Privilege Level
196
Controlling Switch Access with TACACS
196
Understanding TACACS
196
TACACS+ Operation
198
Configuring TACACS
199
Default TACACS+ Configuration
199
Identifying the TACACS+ Server Host and Setting the Authentication Key
199
Configuring TACACS+ Login Authentication
200
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
202
Starting TACACS+ Accounting
203
Displaying the TACACS+ Configuration
203
Controlling Switch Access with RADIUS
204
Understanding RADIUS
204
RADIUS Operation
205
Configuring RADIUS
206
Default RADIUS Configuration
206
Identifying the RADIUS Server Host
207
Configuring RADIUS Login Authentication
209
Defining AAA Server Groups
211
Configuring RADIUS Authorization for User Privileged Access and Network Services
213
Starting RADIUS Accounting
214
Configuring Settings for All RADIUS Servers
215
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
215
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
217
Displaying the RADIUS Configuration
217
Controlling Switch Access with Kerberos
218
Understanding Kerberos
218
Kerberos Operation
220
Authenticating to a Boundary Switch
221
Obtaining a TGT from a KDC
221
Authenticating to Network Services
221
Configuring Kerberos
222
Configuring the Switch for Local Authentication and Authorization
222
Configuring the Switch for Secure Shell
223
Understanding SSH
224
SSH Servers, Integrated Clients, and Supported Versions
224
Limitations
225
Configuring SSH
225
Configuration Guidelines
225
Setting up the Switch to Run SSH
225
Configuring the SSH Server
226
Displaying the SSH Configuration and Status
227
CHAPTER 10 Configuring 802.1X Port-Based Authentication
230
Understanding 802.1X Port-Based Authentication
230
Device Roles
230
Authentication Initiation and Message Exchange
231
Ports in Authorized and Unauthorized States
232
Accounting
233
Supported Topologies
233
Using 802.1X with Port Security
234
Using 802.1X with Voice VLAN Ports
235
Using 802.1X with VLAN Assignment
235
Using 802.1X with Guest VLAN
236
Using 802.1X with Per-User Acls
237
802.1X and Switch Stacks
238
Configuring 802.1X Authentication
238
Default 802.1X Configuration
239
802.1X Configuration Guidelines
240
Upgrading from a Previous Software Release
241
Configuring 802.1X Authentication
241
Configuring the Switch-To-RADIUS-Server Communication
243
Configuring Periodic Re-Authentication
244
Manually Re-Authenticating a Client Connected to a Port
244
Changing the Quiet Period
245
Changing the Switch-To-Client Retransmission Time
245
Setting the Re-Authentication Number
246
Setting the Switch-To-Client Frame-Retransmission Number
246
Configuring the Host Mode
247
Configuring a Guest VLAN
248
Resetting the 802.1X Configuration to the Default Values
249
Displaying 802.1X Statistics and Status
250
Configuring 802.1X Accounting
249
CHAPTER 11 Configuring Interface Characteristics
251
Understanding Interface Types
251
C H a P T E R 11 Configuring Interface Characteristics
252
Port-Based Vlans
252
Switch Ports
252
Access Ports
253
Trunk Ports
253
Routed Ports
253
10-Gigabit Ethernet Interfaces
254
Switch Virtual Interfaces
254
Connecting Interfaces
255
Etherchannel Port Groups
255
Using Interface Configuration Mode
257
Procedures for Configuring Interfaces
258
Configuring a Range of Interfaces
259
Configuring and Using Interface Range Macros
260
Configuring Ethernet Interfaces
262
Default Ethernet Interface Configuration
262
Configuration Guidelines for 10-Gigabit Ethernet Interfaces
264
Configuring Interface Speed and Duplex Mode
264
Configuration Guidelines
265
Setting the Interface Speed and Duplex Parameters
265
Configuring IEEE 802.3Z Flow Control
267
Configuring Auto-MDIX on an Interface
268
Configuring Power over Ethernet on an Interface
269
Adding a Description for an Interface
270
Configuring Layer 3 Interfaces
271
Configuring the System MTU
272
Monitoring and Maintaining the Interfaces
274
Monitoring Interface Status
274
Clearing and Resetting Interfaces and Counters
275
Shutting down and Restarting the Interface
275
Configuring Smartports Macros
277
Understanding Smartports Macros
277
Configuring Smartports Macros
278
Default Smartports Macro Configuration
278
Smartports Macro Configuration Guidelines
279
Creating Smartports Macros
280
Applying Smartports Macros
281
Applying Cisco-Default Smartports Macros
282
Displaying Smartports Macros
284
Configuring Vlans
285
Understanding Vlans
285
Chapter 13 Configuring VLAN
287
Supported Vlans
287
VLAN Port Membership Modes
287
Configuring Normal-Range Vlans
289
Token Ring Vlans
290
Normal-Range VLAN Configuration Guidelines
290
VLAN Configuration Mode Options
291
VLAN Configuration in Config-Vlan Mode
291
VLAN Configuration in VLAN Database Configuration Mode
291
Saving VLAN Configuration
292
Default Ethernet VLAN Configuration
292
Creating or Modifying an Ethernet VLAN
293
Deleting a VLAN
295
Configuring Extended-Range Vlans
296
Default VLAN Configuration
297
Extended-Range VLAN Configuration Guidelines
297
Creating an Extended-Range VLAN
298
Creating an Extended-Range VLAN with an Internal VLAN ID
299
Configuring VLAN Trunks
300
Trunking Overview
301
Encapsulation Types
302
802.1Q Configuration Considerations
303
Default Layer 2 Ethernet Interface VLAN Configuration
303
Configuring an Ethernet Interface as a Trunk Port
303
Interaction with Other Features
304
Configuring a Trunk Port
304
Defining the Allowed Vlans on a Trunk
305
Changing the Pruning-Eligible List
306
Configuring the Native VLAN for Untagged Traffic
307
Configuring Trunk Ports for Load Sharing
308
Load Sharing Using STP Port Priorities
308
Load Sharing Using STP Path Cost
310
Displaying Vlans
300
Configuring VMPS
311
Understanding VMPS
312
Dynamic-Access Port VLAN Membership
312
Default VMPS Client Configuration
313
VMPS Configuration Guidelines
313
Configuring the VMPS Client
314
Entering the IP Address of the VMPS
314
Configuring Dynamic-Access Ports on VMPS Clients
314
Reconfirming VLAN Memberships
315
Changing the Reconfirmation Interval
315
Changing the Retry Count
316
Monitoring the VMPS
316
Troubleshooting Dynamic-Access Port VLAN Membership
317
VMPS Configuration Example
317
Configuring VTP
319
Understanding VTP
319
Assigning Static-Access Ports to a VLAN
295
Chapter 14 Configuring VTP
320
The VTP Domain
320
VTP Modes
321
VTP Advertisements
321
VTP Version 2
322
VTP Pruning
323
VTP and Switch Stacks
324
Configuring VTP
324
Default VTP Configuration
325
VTP Configuration Options
325
VTP Configuration in Global Configuration Mode
325
VTP Configuration in VLAN Database Configuration Mode
326
VTP Configuration Guidelines
326
Domain Names
326
Passwords
327
VTP Version
327
Configuration Requirements
327
Configuring a VTP Server
328
Configuring a VTP Client
329
Disabling VTP (VTP Transparent Mode)
330
Enabling VTP Version 2
331
Enabling VTP Pruning
332
Adding a VTP Client Switch to a VTP Domain
333
Monitoring VTP
334
Configuring Private Vlans
335
Understanding Private Vlans
335
Chapter 15 Configuring Private VLAN
336
IP Addressing Scheme with Private Vlans
337
Private Vlans Across Multiple Switches
338
Private-VLAN Interaction with Other Features
338
Private Vlans and Unicast, Broadcast, and Multicast Traffic
339
Private Vlans and Svis
339
Private Vlans and Switch Stacks
339
Configuring Private Vlans
339
Tasks for Configuring Private Vlans
340
Default Private-VLAN Configuration
341
Private-VLAN Configuration Guidelines
341
Secondary and Primary VLAN Configuration
341
Private-VLAN Port Configuration
342
Limitations with Other Features
343
Configuring and Associating Vlans in a Private VLAN
344
Configuring a Layer 2 Interface as a Private-VLAN Host Port
345
Configuration File
346
Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port
347
Step 1
348
Monitoring Private Vlans
349
Configuring Voice VLAN
351
Understanding Voice VLAN
351
Mapping Secondary Vlans to a Primary VLAN Layer 3 VLAN Interface
348
Chapter 16 Configuring Voice VLAN
352
Cisco IP Phone Voice Traffic
352
Cisco IP Phone Data Traffic
352
Configuring Voice VLAN
353
Default Voice VLAN Configuration
353
Voice VLAN Configuration Guidelines
353
Configuring a Port Connected to a Cisco 7960 IP Phone
354
Configuring IP Phone Voice Traffic
354
Configuring the Priority of Incoming Data Frames
354
Displaying Voice VLAN
356
Configuring STP
357
Understanding Spanning-Tree Features
357
Chapter 17 Configuring STP
358
STP Overview
358
Spanning-Tree Topology and Bpdus
359
Bridge ID, Switch Priority, and Extended System ID
360
Spanning-Tree Interface States
361
Blocking State
363
Listening State
363
Learning State
363
Forwarding State
363
Disabled State
364
How a Switch or Port Becomes the Root Switch or Root Port
364
Spanning Tree and Redundant Connectivity
365
Spanning-Tree Address Management
365
Accelerated Aging to Retain Connectivity
365
Spanning-Tree Modes and Protocols
366
Supported Spanning-Tree Instances
366
Spanning-Tree Interoperability and Backward Compatibility
367
STP and IEEE 802.1Q Trunks
367
VLAN-Bridge Spanning Tree
368
Spanning Tree and Switch Stacks
368
Configuring Spanning-Tree Features
368
Default Spanning-Tree Configuration
369
Spanning-Tree Configuration Guidelines
369
Changing the Spanning-Tree Mode
370
Disabling Spanning Tree
371
Configuring the Root Switch
372
Configuring a Secondary Root Switch
373
Configuring Port Priority
374
Configuring Path Cost
376
Configuring the Switch Priority of a VLAN
377
Configuring Spanning-Tree Timers
378
Configuring the Hello Time
378
Configuring the Forwarding-Delay Time for a VLAN
379
Configuring the Maximum-Aging Time for a VLAN
379
Displaying the Spanning-Tree Status
380
Configuring MSTP
381
Chapter 18 Configuring MSTP
382
Understanding MSTP
382
Multiple Spanning-Tree Regions
382
IST, CIST, and CST
383
Operations Within an MST Region
383
Operations between MST Regions
384
Hop Count
385
Boundary Ports
385
MSTP and Switch Stacks
386
Interoperability with 802.1D STP
386
Understanding RSTP
386
Port Roles and the Active Topology
387
Rapid Convergence
388
Synchronization of Port Roles
389
Bridge Protocol Data Unit Format and Processing
390
Processing Superior BPDU Information
391
Processing Inferior BPDU Information
391
Topology Changes
391
Configuring MSTP Features
392
Default MSTP Configuration
393
MSTP Configuration Guidelines
393
Specifying the MST Region Configuration and Enabling MSTP
394
Configuring the Root Switch
395
Configuring a Secondary Root Switch
397
Configuring Port Priority
398
Configuring Path Cost
399
Configuring the Switch Priority
400
Configuring the Hello Time
400
Configuring the Forwarding-Delay Time
401
Configuring the Maximum-Aging Time
402
Configuring the Maximum-Hop Count
402
Specifying the Link Type to Ensure Rapid Transitions
403
Displaying the MST Configuration and Status
404
Restarting the Protocol Migration Process
403
CHAPTER 19 Configuring Optional Spanning-Tree Features
405
Understanding Optional Spanning-Tree Features
405
Understanding Optional Spanning-Tree Features
406
Understanding Port Fast
406
Understanding BPDU Guard
407
Understanding BPDU Filtering
407
Understanding Uplinkfast
408
Understanding Cross-Stack Uplinkfast
409
How CSUF Works
410
Events that Cause Fast Convergence
411
Understanding Backbonefast
411
Understanding Etherchannel Guard
414
Understanding Root Guard
414
Configuring Optional Spanning-Tree Features
415
Default Optional Spanning-Tree Configuration
416
Optional Spanning-Tree Configuration Guidelines
416
Enabling Port Fast
416
Enabling BPDU Guard
417
Enabling BPDU Filtering
418
Enabling Uplinkfast for Use with Redundant Links
419
Enabling Cross-Stack Uplinkfast
420
Enabling Backbonefast
420
Enabling Etherchannel Guard
421
Enabling Root Guard
421
Enabling Loop Guard
422
Understanding Loop Guard
415
Displaying the Spanning-Tree Status
423
Configuring Flex Links
425
Understanding Flex Links
425
Configuring Flex Links
426
Default Flex Link Configuration
426
Flex Link Configuration Guidelines
426
Chapter 20 Configuring Flex Link
426
Configuring Flex Links
427
Monitoring Flex Links
427
Configuring Flex Links
428
CHAPTER 21 Configuring DHCP Features and IP Source Guard
429
Understanding DHCP Features
429
C H a P T E R 21 Configuring DHCP Features and IP Source Guard
430
DHCP Relay Agent
430
DHCP Server
430
DHCP Snooping
430
Option-82 Data Insertion
431
Cisco IOS DHCP Server Database
433
DHCP Snooping Binding Database
433
DHCP Snooping and Switch Stacks
434
Configuring DHCP Features
435
Default DHCP Configuration
435
DHCP Snooping Configuration Guidelines
436
Configuring the DHCP Server
436
DHCP Server and Switch Stacks
437
Configuring the DHCP Relay Agent
437
Specifying the Packet Forwarding Address
437
Enabling DHCP Snooping and Option 82
438
Enabling DHCP Snooping on Private Vlans
440
Enabling the Cisco IOS DHCP Server Database
440
Enabling the DHCP Snooping Binding Database Agent
440
Displaying DHCP Snooping Information
442
Displaying the DHCP Snooping Configuration
442
Displaying the DHCP Snooping Binding Database
442
Understanding IP Source Guard
443
Source IP Address Filtering
444
Source IP and MAC Address Filtering
444
Configuring IP Source Guard
444
Default IP Source Guard Configuration
444
Configuration Guidelines
445
Enabling IP Source Guard
445
Displaying IP Source Guard Information
447
Configuring Dynamic ARP Inspection
449
Understanding Dynamic ARP Inspection
449
C H a P T E R 22 Configuring Dynamic ARP Inspection
450
Interface Trust States and Network Security
451
Logging of Dropped Packets
452
Rate Limiting of ARP Packets
452
Relative Priority of ARP Acls and DHCP Snooping Entries
452
Configuring Dynamic ARP Inspection
453
Default Dynamic ARP Inspection Configuration
453
Dynamic ARP Inspection Configuration Guidelines
454
Configuring Dynamic ARP Inspection in DHCP Environments
455
Configuring ARP Acls for Non-DHCP Environments
456
Limiting the Rate of Incoming ARP Packets
458
Performing Validation Checks
459
Configuring the Log Buffer
460
Displaying Dynamic ARP Inspection Information
462
Understanding IGMP Snooping
465
Chapter 23 Configuring IGMP Snooping and MVR
466
IGMP Versions
466
Joining a Multicast Group
467
Leaving a Multicast Group
469
Immediate Leave
469
IGMP Report Suppression
469
IGMP Snooping and Switch Stacks
470
Configuring IGMP Snooping
470
Enabling or Disabling IGMP Snooping
471
Setting the Snooping Method
471
Configuring a Multicast Router Port
473
Configuring a Host Statically to Join a Group
474
Enabling IGMP Immediate Leave
475
Disabling IGMP Report Suppression
475
Displaying IGMP Snooping Information
476
Understanding Multicast VLAN Registration
477
Using MVR in a Multicast Television Application
477
Configuring MVR
479
Default MVR Configuration
479
MVR Configuration Guidelines and Limitations
480
Configuring MVR Global Parameters
480
Configuring MVR Interfaces
481
Displaying MVR Information
483
Configuring IGMP Filtering and Throttling
483
Default IGMP Filtering and Throttling Configuration
484
Configuring IGMP Profiles
485
Applying IGMP Profiles
486
Setting the Maximum Number of IGMP Groups
487
Configuring the IGMP Throttling Action
487
Displaying IGMP Filtering and Throttling Configuration
489
CHAPTER 24 Configuring Port-Based Traffic Control
491
Configuring Storm Control
491
Understanding Storm Control
492
C H a P T E R 24 Configuring Port-Based Traffic Control
493
Default Storm Control Configuration
493
Enabling Storm Control
493
Configuring Protected Ports
495
Default Protected Port Configuration
495
Protected Port Configuration Guidelines
495
Configuring a Protected Port
495
Configuring Port Blocking
496
Default Port Blocking Configuration
496
Blocking Flooded Traffic on an Interface
496
Configuring Port Security
497
Understanding Port Security
497
Secure MAC Addresses
497
Security Violations
498
Default Port Security Configuration
499
Configuration Guidelines
500
Enabling and Configuring Port Security
500
Enabling and Configuring Port Security Aging
503
Port Security and Switch Stacks
504
Displaying Port-Based Traffic Control Settings
505
Configuring CDP
507
Understanding CDP
507
CDP and Switch Stacks
508
Configuring CDP
508
Default CDP Configuration
508
Configuring the CDP Characteristics
508
Chapter 25 Configuring CDP
509
Disabling and Enabling CDP
509
Disabling and Enabling CDP on an Interface
510
Monitoring and Maintaining CDP
511
Configuring UDLD
513
Understanding UDLD
513
Modes of Operation
513
Chapter 26 Configuring UDLD
514
Default UDLD Configuration
516
Configuration Guidelines
516
Enabling UDLD Globally
517
Enabling UDLD on an Interface
518
Resetting an Interface Disabled by UDLD
518
Displaying UDLD Status
519
Configuring SPAN and RSPAN
521
Understanding SPAN and RSPAN
521
Chapter 27 Configuring SPAN and RSPAN
522
Local SPAN
522
Remote SPAN
523
SPAN and RSPAN Concepts and Terminology
524
SPAN Sessions
524
Monitored Traffic
525
Source Ports
526
Source Vlans
527
VLAN Filtering
527
Destination Port
528
Rspan Vlan
529
SPAN and RSPAN Interaction with Other Features
529
SPAN and RSPAN and Switch Stacks
530
Configuring SPAN and RSPAN
530
Default SPAN and RSPAN Configuration
531
Configuring Local SPAN
531
SPAN Configuration Guidelines
531
Creating a Local SPAN Session
531
Creating a Local SPAN Session and Configuring Ingress Traffic
531
Specifying Vlans to Filter
536
Configuring RSPAN
537
RSPAN Configuration Guidelines
537
Configuring a VLAN as an RSPAN VLAN
538
Creating an RSPAN Source Session
539
Creating an RSPAN Destination Session
540
Creating an RSPAN Destination Session and Configuring Ingress Traffic
541
Specifying Vlans to Filter
543
Displaying SPAN and RSPAN Status
544
Configuring RMON
545
Understanding RMON
545
Configuring RMON
546
Default RMON Configuration
547
Configuring RMON Alarms and Events
547
Collecting Group History Statistics on an Interface
549
Collecting Group Ethernet Statistics on an Interface
550
Displaying RMON Status
550
Configuring System Message Logging
551
Understanding System Message Logging
551
Configuring System Message Logging
552
System Log Message Format
552
C H a P T E R 29 Configuring System Message Logging
553
Default System Message Logging Configuration
554
Disabling Message Logging
554
Setting the Message Display Destination Device
555
Synchronizing Log Messages
556
Enabling and Disabling Time Stamps on Log Messages
557
Enabling and Disabling Sequence Numbers in Log Messages
558
Defining the Message Severity Level
559
Limiting Syslog Messages Sent to the History Table and to SNMP
560
Configuring UNIX Syslog Servers
561
Logging Messages to a UNIX Syslog Daemon
561
Configuring the UNIX System Logging Facility
562
Displaying the Logging Configuration
563
Configuring SNMP
565
Understanding SNMP
565
Chapter 30 Configuring SNMP
566
SNMP Versions
566
SNMP Manager Functions
567
SNMP Agent Functions
568
SNMP Community Strings
568
Using SNMP to Access MIB Variables
569
SNMP Notifications
569
SNMP Ifindex MIB Object Values
570
Configuring SNMP
570
Default SNMP Configuration
571
SNMP Configuration Guidelines
571
Disabling the SNMP Agent
572
Configuring Community Strings
572
Configuring SNMP Groups and Users
574
Configuring SNMP Notifications
576
Setting the Agent Contact and Location Information
579
Limiting TFTP Servers Used through SNMP
580
SNMP Examples
580
Displaying SNMP Status
581
Configuring Network Security with Acls
583
Understanding Acls
583
C H a P T E R 31 Configuring Network Security with Acls
584
Supported Acls
584
Port Acls
585
Router Acls
586
VLAN Maps
586
Handling Fragmented and Unfragmented Traffic
587
Acls and Switch Stacks
588
Configuring IP Acls
588
Creating Standard and Extended IP Acls
589
Access List Numbers
589
Creating a Numbered Standard ACL
591
Creating a Numbered Extended ACL
593
Resequencing Aces in an ACL
597
Creating Named Standard and Extended Acls
597
Using Time Ranges with Acls
599
Including Comments in Acls
601
Applying an IP ACL to a Terminal Line
601
Applying an IP ACL to an Interface
602
Hardware and Software Treatment of IP Acls
604
IP ACL Configuration Examples
604
Numbered Acls
606
Extended Acls
606
Named Acls
606
Time Range Applied to an IP ACL
607
Commented IP ACL Entries
607
ACL Logging
608
Creating Named MAC Extended Acls
609
Applying a MAC ACL to a Layer 2 Interface
611
Configuring VLAN Maps
612
VLAN Map Configuration Guidelines
612
Creating a VLAN Map
613
Examples of Acls and VLAN Maps
614
Applying a VLAN Map to a VLAN
616
Using VLAN Maps in Your Network
616
Wiring Closet Configuration
617
Denying Access to a Server on Another VLAN
618
Using VLAN Maps with Router Acls
619
Guidelines
619
Examples of Router Acls and VLAN Maps Applied to Vlans
620
Acls and Switched Packets
620
Acls and Bridged Packets
620
Acls and Routed Packets
621
Acls and Multicast Packets
622
Displaying ACL Configuration
622
Configuring Qos
625
Understanding Qos
625
Chapter 32 Configuring Qo
627
Basic Qos Model
627
Classification
628
Classification Based on Qos Acls
631
Classification Based on Class Maps and Policy Maps
631
Policing and Marking
632
Mapping Tables
634
Queueing and Scheduling Overview
635
Weighted Tail Drop
635
SRR Shaping and Sharing
636
Queueing and Scheduling on Ingress Queues
637
Queueing and Scheduling on Egress Queues
639
Packet Modification
641
Configuring Auto-Qos
642
Generated Auto-Qos Configuration
642
Effects of Auto-Qos on the Configuration
647
Auto-Qos Configuration Guidelines
647
Upgrading from a Previous Software Release
648
Enabling Auto-Qos for Voip
648
Auto-Qos Configuration Example
650
Displaying Auto-Qos Information
652
Configuring Standard Qos
652
Default Standard Qos Configuration
653
Default Ingress Queue Configuration
653
Default Egress Queue Configuration
654
Default Mapping Table Configuration
654
Standard Qos Configuration Guidelines
655
Enabling Qos Globally
656
Configuring Classification Using Port Trust States
656
Configuring the Trust State on Ports Within the Qos Domain
656
Configuring the Cos Value for an Interface
656
Configuring a Trusted Boundary to Ensure Port Security
656
Configuring the DSCP Trust State on a Port Bordering Another Qos Domain
656
Configuring a Qos Policy
662
Classifying Traffic by Using Acls
662
Classifying Traffic by Using Class Maps
666
Classifying, Policing, and Marking Traffic by Using Policy Maps
668
Classifying, Policing, and Marking Traffic by Using Aggregate Policers
671
Configuring DSCP Maps
673
Configuring the Cos-To-DSCP Map
674
Configuring the IP-Precedence-To-DSCP Map
674
Configuring the Policed-DSCP Map
675
Configuring the DSCP-To-Cos Map
676
Configuring the DSCP-To-DSCP-Mutation Map
677
Configuring Ingress Queue Characteristics
679
Mapping DSCP or Cos Values to an Ingress Queue and Setting WTD Thresholds
679
Allocating Buffer Space between the Ingress Queues
681
Allocating Bandwidth between the Ingress Queues
682
Configuring the Ingress Priority Queue
683
Configuring Egress Queue Characteristics
684
Configuration Guidelines
684
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
684
Mapping DSCP or Cos Values to an Egress Queue and to a Threshold ID
686
Configuring SRR Shaped Weights on Egress Queues
688
Configuring SRR Shared Weights on Egress Queues
689
Configuring the Egress Expedite Queue
690
Limiting the Bandwidth on an Egress Interface
690
Displaying Standard Qos Information
691
Configuring Etherchannels
693
Understanding Etherchannels
693
C H a P T E R 33 Configuring Etherchannels
694
Etherchannel Overview
694
Port-Channel Interfaces
696
Port Aggregation Protocol
697
Pagp Modes
697
Pagp Interaction with Other Features
698
Link Aggregation Control Protocol
698
LACP Modes
699
LACP Interaction with Other Features
699
Load Balancing and Forwarding Methods
699
Etherchannel and Switch Stacks
701
Configuring Etherchannels
702
Default Etherchannel Configuration
702
Etherchannel Configuration Guidelines
703
Configuring Layer 2 Etherchannels
704
Configuring Layer 3 Etherchannels
707
Creating Port-Channel Logical Interfaces
707
Configuring the Physical Interfaces
708
Configuring Etherchannel Load Balancing
710
Configuring the Pagp Learn Method and Priority
711
Configuring LACP Hot-Standby Ports
712
Configuring the LACP System Priority
713
Configuring the LACP Port Priority
714
Displaying Etherchannel, Pagp, and LACP Status
715
Configuring IP Unicast Routing
717
Understanding IP Routing
718
Types of Routing
718
Chapter 34 Configuring IP Unicast Routing
719
IP Routing and Switch Stacks
719
Steps for Configuring Routing
720
Configuring IP Addressing
721
Default Addressing Configuration
721
Assigning IP Addresses to Network Interfaces
722
Use of Subnet Zero
723
Classless Routing
723
Configuring Address Resolution Methods
725
Define a Static ARP Cache
726
Set ARP Encapsulation
727
Enable Proxy ARP
727
Routing Assistance When IP Routing Is Disabled
728
Proxy ARP
728
Default Gateway
728
ICMP Router Discovery Protocol (IRDP)
729
Configuring Broadcast Packet Handling
730
Enabling Directed Broadcast-To-Physical Broadcast Translation
730
Forwarding UDP Broadcast Packets and Protocols
731
Establishing an IP Broadcast Address
732
Flooding IP Broadcasts
733
Monitoring and Maintaining IP Addressing
734
Enabling IP Unicast Routing
735
Configuring RIP
736
Default RIP Configuration
736
Configuring Basic RIP Parameters
737
Configuring RIP Authentication
739
Configuring Summary Addresses and Split Horizon
739
Configuring Split Horizon
740
Configuring OSPF
741
Default OSPF Configuration
742
Configuring Basic OSPF Parameters
743
Configuring OSPF Interfaces
744
Configuring OSPF Area Parameters
745
Configuring Other OSPF Parameters
746
Changing LSA Group Pacing
748
Configuring a Loopback Interface
748
Monitoring OSPF
749
Configuring EIGRP
750
Default EIGRP Configuration
751
Configuring Basic EIGRP Parameters
752
Configuring EIGRP Interfaces
753
Configuring EIGRP Route Authentication
754
Monitoring and Maintaining EIGRP
755
Configuring BGP
756
Default BGP Configuration
758
Enabling BGP Routing
760
Managing Routing Policy Changes
762
Configuring BGP Decision Attributes
763
Configuring BGP Filtering with Route Maps
765
Configuring BGP Filtering by Neighbor
766
Configuring Prefix Lists for BGP Filtering
767
Configuring BGP Community Filtering
768
Configuring BGP Neighbors and Peer Groups
770
Configuring Aggregate Addresses
772
Configuring Routing Domain Confederations
772
Configuring BGP Route Reflectors
773
Configuring Route Dampening
774
Monitoring and Maintaining BGP
775
Configuring Protocol-Independent Features
776
Configuring Distributed Cisco Express Forwarding
776
Configuring the Number of Equal-Cost Routing Paths
778
Configuring Static Unicast Routes
778
Specifying Default Routes and Networks
779
Using Route Maps to Redistribute Routing Information
780
Configuring Policy-Based Routing
784
PBR Configuration Guidelines
785
Enabling PBR
785
Filtering Routing Information
787
Setting Passive Interfaces
787
Controlling Advertising and Processing in Routing Updates
788
Filtering Sources of Routing Information
788
Managing Authentication Keys
789
Monitoring and Maintaining the IP Network
790
Configuring HSRP
791
Understanding HSRP
791
Chapter 35 Configuring HSRP
792
HSRP and Switch Stacks
792
Configuring HSRP
793
Default HSRP Configuration
794
HSRP Configuration Guidelines
794
Enabling HSRP
794
Configuring HSRP Group Attributes
795
Configuring HSRP Priority
796
Configuring Multiple HSRP
796
Configuring HSRP Authentication and Timers
799
Enabling HSRP Support for ICMP Redirect Messages
800
Configuring HSRP Groups and Clustering
801
Displaying HSRP Configurations
801
Configuring IP Multicast Routing
803
C H a P T E R 36 Configuring IP Multicast Routing
804
Understanding Cisco's Implementation of IP Multicast Routing
804
Understanding IGMP
804
IGMP Version 1
805
IGMP Version 2
805
Understanding PIM
805
PIM Versions
806
PIM Modes
806
Auto-RP
807
Bootstrap Router
807
Multicast Forwarding and Reverse Path Check
808
Understanding DVMRP
809
Understanding CGMP
809
Multicast Routing and Switch Stacks
810
Configuring IP Multicast Routing
810
Default Multicast Routing Configuration
810
Multicast Routing Configuration Guidelines
811
Pimv1 and Pimv2 Interoperability
811
Auto-RP and BSR Configuration Guidelines
812
Configuring Basic Multicast Routing
812
Configuring a Rendezvous Point
814
Manually Assigning an RP to Multicast Groups
814
Configuring Auto-RP
816
Configuring Pimv2 BSR
820
Using Auto-RP and a BSR
824
Monitoring the RP Mapping Information
825
Troubleshooting Pimv1 and Pimv2 Interoperability Problems
825
Configuring Advanced PIM Features
825
Understanding PIM Shared Tree and Source Tree
825
Delaying the Use of PIM Shortest-Path Tree
827
Modifying the PIM Router-Query Message Interval
828
Configuring Optional IGMP Features
829
Default IGMP Configuration
829
Configuring the Switch as a Member of a Group
829
Controlling Access to IP Multicast Groups
830
Changing the IGMP Version
831
Modifying the IGMP Host-Query Message Interval
832
Changing the IGMP Query Timeout for Igmpv2
833
Changing the Maximum Query Response Time for Igmpv2
833
Configuring the Switch as a Statically Connected Member
834
Configuring Optional Multicast Routing Features
834
Enabling CGMP Server Support
835
Configuring Sdr Listener Support
836
Enabling Sdr Listener Support
836
Limiting How Long an Sdr Cache Entry Exists
837
Configuring an IP Multicast Boundary
837
Configuring Basic DVMRP Interoperability Features
839
Configuring DVMRP Interoperability
839
Configuring a DVMRP Tunnel
841
Advertising Network 0.0.0.0 to DVMRP Neighbors
843
Responding to Mrinfo Requests
844
Configuring Advanced DVMRP Interoperability Features
844
Enabling DVMRP Unicast Routing
845
Rejecting a DVMRP Nonpruning Neighbor
845
Controlling Route Exchanges
848
Limiting the Number of DVMRP Routes Advertised
848
Changing the DVMRP Route Threshold
848
Configuring a DVMRP Summary Address
849
Disabling DVMRP Autosummarization
851
Adding a Metric Offset to the DVMRP Route
851
Monitoring and Maintaining IP Multicast Routing
852
Clearing Caches, Tables, and Databases
853
Displaying System and Network Statistics
853
Monitoring IP Multicast Routing
854
Configuring MSDP
855
Understanding MSDP
855
Chapter 37 Configuring MSDP
856
MSDP Operation
856
MSDP Benefits
857
Configuring MSDP
858
Default MSDP Configuration
858
Configuring a Default MSDP Peer
858
Caching Source-Active State
860
Requesting Source Information from an MSDP Peer
862
Controlling Source Information that Your Switch Originates
863
Redistributing Sources
863
Filtering Source-Active Request Messages
865
Controlling Source Information that Your Switch Forwards
866
Using a Filter
866
Using TTL to Limit the Multicast Data Sent in SA Messages
868
Controlling Source Information that Your Switch Receives
868
Configuring an MSDP Mesh Group
870
Shutting down an MSDP Peer
870
Including a Bordering PIM Dense-Mode Region in MSDP
871
Configuring an Originating Address Other than the RP Address
872
Monitoring and Maintaining MSDP
873
Configuring Fallback Bridging
875
Understanding Fallback Bridging
875
Fallback Bridging Overview
875
Fallback Bridging and Switch Stacks
877
Configuring Fallback Bridging
877
Default Fallback Bridging Configuration
878
Fallback Bridging Configuration Guidelines
878
Creating a Bridge Group
878
Adjusting Spanning-Tree Parameters
880
Changing the VLAN-Bridge Spanning-Tree Priority
881
Changing the Interface Priority
881
Assigning a Path Cost
882
Adjusting BPDU Intervals
883
Disabling the Spanning Tree on an Interface
885
Monitoring and Maintaining Fallback Bridging
885
Troubleshooting
887
Chapter 39 Troubleshooting
888
Recovering from Corrupted Software by Using the Xmodem Protocol
888
Recovering from a Lost or Forgotten Password
890
Procedure with Password Recovery Enabled
891
Procedure with Password Recovery Disabled
892
Preventing Switch Stack Problems
894
Recovering from a Command Switch Failure
895
Replacing a Failed Command Switch with a Cluster Member
895
Replacing a Failed Command Switch with Another Switch
897
Recovering from Lost Cluster Member Connectivity
898
Preventing Autonegotiation Mismatches
899
Troubleshooting Power over Ethernet Switch Ports
899
SFP Module Security and Identification
899
Monitoring SFP Module Status
900
Using Ping
900
Understanding Ping
900
Executing Ping
901
Using Layer 2 Traceroute
902
Understanding Layer 2 Traceroute
902
Usage Guidelines
902
Displaying the Physical Path
903
Using IP Traceroute
903
Understanding IP Traceroute
903
Executing IP Traceroute
904
Using TDR
905
Understanding TDR
905
Running TDR and Displaying the Results
906
Using Debug Commands
907
Enabling Debugging on a Specific Feature
908
Enabling All-System Diagnostics
908
Redirecting Debug and Error Message Output
908
Using the Show Platform Forward Command
909
Using the Crashinfo File
911
Appendix
913
Supported Mibs
913
MIB List
913
Appendix A Supported MIB
914
MIB List
914
Using FTP to Access the MIB Files
915
Appendix
917
Working with the Cisco IOS File System, Configuration Files, and Software Images
917
Working with the Flash File System
917
Displaying Available File Systems
918
A P P E N D I X B Working with the Cisco IOS File System, Configuration Files, and Software Images
919
Setting the Default File System
919
Displaying Information about Files on a File System
919
Changing Directories and Displaying the Working Directory
920
Creating and Removing Directories
920
Copying Files
921
Deleting Files
921
Creating, Displaying, and Extracting Tar Files
922
Creating a Tar File
922
Displaying the Contents of a Tar File
922
Extracting a Tar File
923
Displaying the Contents of a File
924
Working with Configuration Files
924
Guidelines for Creating and Using Configuration Files
925
Configuration File Types and Location
925
Creating a Configuration File by Using a Text Editor
925
Copying Configuration Files by Using TFTP
925
Preparing to Download or Upload a Configuration File by Using TFTP
926
Downloading the Configuration File by Using TFTP
926
Uploading the Configuration File by Using TFTP
926
Preparing to Download or Upload a Configuration File by Using FTP
926
Downloading a Configuration File by Using FTP
929
Uploading a Configuration File by Using FTP
929
Copying Configuration Files by Using RCP
932
Preparing to Download or Upload a Configuration File by Using RCP
932
Downloading a Configuration File by Using RCP
933
Uploading a Configuration File by Using RCP
934
Clearing Configuration Information
935
Clearing the Startup Configuration File
935
Deleting a Stored Configuration File
935
Working with Software Images
936
Image Location on the Switch
936
Tar File Format of Images on a Server or Cisco.com
936
Copying Image Files by Using TFTP
938
Preparing to Download or Upload an Image File by Using TFTP
938
Downloading an Image File by Using TFTP
938
Uploading an Image File by Using TFTP
938
Copying Image Files by Using FTP
941
Preparing to Download or Upload an Image File by Using FTP
941
Downloading an Image File by Using FTP
941
Uploading an Image File by Using FTP
941
Copying Image Files by Using RCP
945
Preparing to Download or Upload an Image File by Using RCP
945
Downloading an Image File by Using RCP
945
Uploading an Image File by Using RCP
945
Copying an Image File from One Stack Member to Another
950
Appendix
951
Unsupported Commands in Cisco IOS Release 12.2(20)SE
951
Access Control Lists
951
Unsupported Privileged EXEC Commands
951
Unsupported Global Configuration Commands
951
A P P E N D I X C Unsupported Commands in Cisco IOS Release 12.2(20)SE
952
ARP Commands
952
Unsupported Global Configuration Commands
952
Unsupported Interface Configuration Commands
952
Fallback Bridging
952
Unsupported Privileged EXEC Commands
952
Unsupported Interface Configuration Commands
953
Hsrp
954
Unsupported Global Configuration Commands
954
Unsupported Interface Configuration Commands
954
IGMP Snooping Commands
954
Interface Commands
954
Unsupported Privileged EXEC Commands
954
Unsupported Interface Configuration Commands
955
IP Multicast Routing
955
Unsupported Privileged EXEC Commands
955
Unsupported Global Configuration Commands
955
Unsupported Interface Configuration Commands
956
IP Unicast Routing
956
Unsupported Privileged EXEC or User EXEC Commands
956
Unsupported Global Configuration Commands
957
Unsupported Interface Configuration Commands
957
Unsupported BGP Router Configuration Commands
958
Unsupported VPN Configuration Commands
958
Unsupported Route Map Commands
958
MAC Address Commands
959
Unsupported Privileged EXEC Commands
959
Miscellaneous
959
Unsupported Global Configuration Commands
959
Msdp
959
Unsupported Global Configuration Commands
960
Network Address Translation (NAT) Commands
960
Unsupported User EXEC Commands
960
Unsupported Interface Configuration Commands
960
Radius
960
Snmp
961
Unsupported Global Configuration Commands
961
Spanning Tree
961
Unsupported Global Configuration Command
961
Unsupported Interface Configuration Command
961
Vlan
961
Unsupported User EXEC Commands
961
Vtp
961
Unsupported Privileged EXEC Commands
961
I N D E X
963
Advertisement
Advertisement
Related Products
Cisco WS-C3750-48PS-E
Cisco WS-C3750-48TS-E
Cisco WS-C3750-24PS-E
Cisco WS-C3750G-12S-E
Cisco WS-C3750V2-48TS-E
Cisco WS-C3750X-48T-L
Cisco WS-C3750-24TS-E - Catalyst Switch - Stackable
Cisco WS-C3750G-24TS-E - Catalyst 3750G-24TS-E 10/100/1000 Switch
Cisco WS-C3750-24FS-S
Cisco WS-C3750G-48PS-S
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL