Sign In
Upload
Manuals
Brands
Cisco Manuals
Switch
WS-CBS3032-DEL
User Manuals: Cisco WS-CBS3032-DEL Blade Switch Dell
Manuals and User Guides for Cisco WS-CBS3032-DEL Blade Switch Dell. We have
1
Cisco WS-CBS3032-DEL Blade Switch Dell manual available for free PDF download: Software Configuration Manual
Cisco WS-CBS3032-DEL Software Configuration Manual (1380 pages)
Software Guide
Brand:
Cisco
| Category:
Switch
| Size: 14.28 MB
Table of Contents
Table of Contents
3
Related Publications
48
Obtaining Documentation and Submitting a Service Request
49
Features
51
Chapter 1 Overview
52
Deployment Features
53
Performance Features
54
Management Options
55
Manageability Features
56
Availability and Redundancy Features
58
VLAN Features
59
Security Features
60
Qos and Cos Features
63
Layer 3 Features
64
Monitoring Features
65
Default Settings after Initial Switch Configuration
66
Network Configuration Examples
70
Design Concepts for Using the Switch
70
Small to Medium-Sized Network
73
Where to Go Next
74
Using the Command-Line Interface
75
Understanding Command Modes
75
C H a P T E R 2 Using the Command-Line Interface
76
Understanding Abbreviated Commands
77
Understanding the Help System
77
Understanding CLI Error Messages
78
Understanding no and Default Forms of Commands
78
Changing the Command History Buffer Size
79
Using Command History
79
Using Configuration Logging
79
Disabling the Command History Feature
80
Enabling and Disabling Editing Features
80
Recalling Commands
80
Using Editing Features
80
Editing Commands through Keystrokes
81
Editing Command Lines that Wrap
82
Accessing the CLI
83
Searching and Filtering Output of Show and more Commands
83
Accessing the CLI through a Console Connection or through Telnet
84
CHAPTER 3 Assigning the Switch IP Address and Default Gateway3-1
86
C H a P T E R 3 Assigning the Switch IP Address and Default Gateway
86
Understanding the Boot Process
86
Assigning Switch Information
87
Default Switch Information
87
Understanding DHCP-Based Autoconfiguration
88
DHCP Client Request Process
88
Understanding DHCP-Based Autoconfiguration and Image Update
89
DHCP Autoconfiguration
89
DHCP Auto-Image Update
90
Limitations and Restrictions
90
Configuring DHCP-Based Autoconfiguration
91
DHCP Server Configuration Guidelines
91
Configuring the TFTP Server
92
Configuring the DNS
92
Configuring the Relay Device
92
Obtaining Configuration Files
93
Example Configuration
94
Configuring the DHCP Auto Configuration and Image Update Features
96
Configuring DHCP Autoconfiguration (Only Configuration File)
96
Configuring DHCP Auto-Image Update (Configuration File and Image)
97
Configuring the Client
98
Manually Assigning IP Information
99
Checking and Saving the Running Configuration
101
Configuring the NVRAM Buffer Size
102
Modifying the Startup Configuration
103
Default Boot Configuration
103
Automatically Downloading a Configuration File
103
Specifying the Filename to Read and Write the System Configuration
104
Booting Manually
104
Booting a Specific Software Image
105
Controlling Environment Variables
106
Scheduling a Reload of the Software Image
108
Configuring a Scheduled Reload
108
Displaying Scheduled Reload Information
109
CHAPTER 4 Configuring Cisco IOS Configuration Engine4-1
111
Understanding Cisco Configuration Engine Software
111
C H a P T E R 4 Configuring Cisco IOS Configuration Engine
112
Configuration Service
112
Event Service
113
Namespace Mapper
113
What You Should Know about the CNS Ids and Device Hostnames
113
Configid
113
Deviceid
114
Hostname and Deviceid
114
Using Hostname, Deviceid, and Configid
114
Understanding Cisco IOS Agents
115
Initial Configuration
115
Incremental (Partial) Configuration
116
Synchronized Configuration
116
Configuring Cisco IOS Agents
116
Enabling Automated CNS Configuration
117
Enabling the CNS Event Agent
118
Enabling the Cisco IOS CNS Agent
119
Enabling an Initial Configuration
119
Enabling a Partial Configuration
123
Displaying CNS Configuration
124
Administering the Switch
125
Managing the System Time and Date
125
Chapter 5 Administering the Switch
126
Understanding Network Time Protocol
126
Understanding the System Clock
126
Configuring Time and Date Manually
128
Setting the System Clock
129
Displaying the Time and Date Configuration
129
Configuring the Time Zone
130
Configuring Summer Time (Daylight Saving Time)
131
NTP Version 4
128
Configuring a System Name and Prompt
132
Configuring a System Name
133
Default System Name and Prompt Configuration
133
Understanding DNS
133
Default DNS Configuration
134
Setting up DNS
134
Displaying the DNS Configuration
135
Creating a Banner
135
Default Banner Configuration
135
Configuring a Message-Of-The-Day Login Banner
136
Configuring a Login Banner
137
Managing the MAC Address Table
137
Building the Address Table
138
MAC Addresses and Vlans
138
Default MAC Address Table Configuration
139
MAC Addresses and Switch Stacks
139
Changing the Address Aging Time
140
Configuring MAC Address Change Notification Traps
140
Removing Dynamic Address Entries
140
Configuring MAC Address Move Notification Traps
142
Configuring MAC Threshold Notification Traps
143
Adding and Removing Static Address Entries
144
Configuring Unicast MAC Address Filtering
145
Disabling MAC Address Learning on a VLAN
147
Displaying Address Table Entries
148
Managing the ARP Table
148
CHAPTER 6 Configuring Switch-Based Authentication6-1
149
Preventing Unauthorized Access to Your Switch
149
Protecting Access to Privileged EXEC Commands
150
Default Password and Privilege Level Configuration
150
C H a P T E R 6 Configuring Switch-Based Authentication
151
Setting or Changing a Static Enable Password
151
Protecting Enable and Enable Secret Passwords with Encryption
151
Disabling Password Recovery
153
Setting a Telnet Password for a Terminal Line
154
Configuring Username and Password Pairs
154
Configuring Multiple Privilege Levels
155
Setting the Privilege Level for a Command
156
Changing the Default Privilege Level for Lines
157
Logging into and Exiting a Privilege Level
157
Controlling Switch Access with TACACS
158
Understanding TACACS
158
TACACS+ Operation
160
Configuring TACACS
160
Default TACACS+ Configuration
161
Identifying the TACACS+ Server Host and Setting the Authentication Key
161
Configuring TACACS+ Login Authentication
162
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
164
Starting TACACS+ Accounting
165
Establishing a Session with a Router if the AAA Server Is Unreachable
165
Displaying the TACACS+ Configuration
165
Controlling Switch Access with RADIUS
166
Understanding RADIUS
166
RADIUS Operation
167
RADIUS Change of Authorization
168
Overview
168
Change-Of-Authorization Requests
169
Coa Request Commands
169
Coa Request Response Code
169
Stacking Guidelines for Session Termination
174
Configuring Radius
175
Default RADIUS Configuration
175
Identifying the RADIUS Server Host
175
Configuring RADIUS Login Authentication
178
Defining AAA Server Groups
180
Configuring RADIUS Authorization for User Privileged Access and Network Services
182
Establishing a Session with a Router if the AAA Server Is Unreachable
183
Starting RADIUS Accounting
183
Configuring Settings for All RADIUS Servers
184
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
184
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
186
Configuring Coa on the Switch
187
Configuring RADIUS Server Load Balancing
188
Controlling Switch Access with Kerberos
188
Understanding Kerberos
189
Kerberos Operation
191
Authenticating to a Boundary Switch
191
Obtaining a TGT from a KDC
191
Authenticating to Network Services
192
Configuring Kerberos
192
Displaying the RADIUS Configuration
188
Monitoring and Troubleshooting Coa Functionality
188
Configuring the Switch for Local Authentication and Authorization
192
Configuring the Switch for Secure Shell
193
Understanding SSH
194
SSH Servers, Integrated Clients, and Supported Versions
194
Limitations
195
Configuring SSH
195
Configuration Guidelines
195
Setting up the Switch to Run SSH
195
Configuring the SSH Server
196
Displaying the SSH Configuration and Status
197
Configuring the Switch for Secure Socket Layer HTTP
198
Understanding Secure HTTP Servers and Clients
198
Certificate Authority Trustpoints
198
Ciphersuites
199
Configuring Secure HTTP Servers and Clients
200
Default SSL Configuration
200
SSL Configuration Guidelines
200
Configuring a CA Trustpoint
201
Configuring the Secure HTTP Server
202
Configuring the Secure HTTP Client
203
Displaying Secure HTTP Server and Client Status
204
Configuring the Switch for Secure Copy Protocol
205
Information about Secure Copy
205
Understanding Switch Stacks
207
Managing Switch Stack
208
Chapter 7 Managing Switch Stack
208
Switch Stack Membership
209
Stack Master Election and Re-Election
212
Stack Member Numbers
214
Switch Stack Bridge ID and Router MAC Address
214
Stack Member Priority Values
215
Switch Stack Offline Configuration
215
Effects of Adding a Provisioned Switch to a Switch Stack
216
Effects of Replacing a Provisioned Switch in a Switch Stack
217
Effects of Removing a Provisioned Switch from a Switch Stack
217
Hardware Compatibility and SDM Mismatch Mode in Switch Stacks
218
Major Version Number Incompatibility Among Switches
218
Stack Protocol Version Compatibility
218
Switch Stack Software Compatibility Recommendations
218
Minor Version Number Incompatibility Among Switches
219
Understanding Auto-Upgrade and Auto-Advise
219
Auto-Upgrade and Auto-Advise Example Messages
220
Incompatible Software and Stack Member Image Upgrades
222
Switch Stack Configuration Files
222
Additional Considerations for System-Wide Configuration on Switch Stacks
223
Switch Stack Management Connectivity
224
Connectivity to the Switch Stack through an IP Address
224
Connectivity to the Switch Stack through an SSH Session
224
Connectivity to the Switch Stack through Console Ports or Ethernet Management Ports
224
Connectivity to Specific Stack Members
225
Switch Stack Configuration Scenarios
225
Configuring the Switch Stack
227
Default Switch Stack Configuration
227
Enabling Persistent MAC Address
227
Assigning Stack Member Information
230
Assigning a Stack Member Number
230
Setting the Stack Member Priority Value
231
Provisioning a New Member for a Switch Stack
231
Accessing the CLI of a Specific Stack Member
232
Displaying Switch Stack Information
233
Troubleshooting Stacks
233
Manually Disabling a Stack Port
234
Re-Enabling a Stack Port While Another Member Starts
234
Understanding the Show Switch Stack-Ports Summary Output
235
Identifying Loopback Problems
236
Software Loopback
236
Software Loopback Example: no Connected Stack Cable
237
Software Loopback Examples: Connected Stack Cables
237
Hardware Loopback
238
Hardware Loopback Example: LINK OK Event
238
Hardware Loop Example: LINK NOT OK Event
239
Finding a Disconnected Stack Cable
239
Fixing a Bad Connection between Stack Ports
240
Understanding the SDM Templates
241
Chapter 8 Configuring SDM Template
242
Dual Ipv4 and Ipv6 SDM Templates
242
SDM Templates and Switch Stacks
243
Configuring the Switch SDM Template
244
Default SDM Template
244
SDM Template Configuration Guidelines
244
Setting the SDM Template
245
Displaying the SDM Templates
246
Understanding Ieee 802.1X Port-Based Authentication
250
CHAPTER 9 Configuring IEEE 802.1X Port-Based Authentication9-1
250
C H a P T E R 9 Configuring IEEE 802.1X Port-Based Authentication
250
Understanding IEEE 802.1X Port-Based Authentication
250
Device Roles
251
Authentication Process
252
Authentication Initiation and Message Exchange
254
Authentication Manager
256
Port-Based Authentication Methods
256
Authentication Manager CLI Commands
257
Per-User Acls and Filter-Ids
257
Authentication Manager
258
Ports in Authorized and Unauthorized States
259
Authentication and Switch Stacks
260
Host Mode
260
Multiple Authentication Mode
261
MAC Move
262
MAC Replace
262
Accounting
263
Accounting Attribute-Value Pairs
263
Readiness Check
264
Authentication with VLAN Assignment
264
Authentication with Per-User Acls
266
X Authentication with Downloadable Acls and Redirect Urls
267
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL
268
Cisco Secure ACS and Attribute-Value Pairs for Downloadable Acls
269
VLAN ID-Based MAC Authentication
269
Authentication with Guest VLAN
269
Authentication with Restricted VLAN
270
Authentication with Inaccessible Authentication Bypass
271
Overview
271
Support on Multiple-Authentication Ports
272
Authentication Results
272
Feature Interactions
272
X Authentication with Voice VLAN Ports
273
User Distribution
274
X Authentication with Wake-On-LAN
274
Authentication with Port Security
274
X User Distribution Configuration Guidelines
275
Authentication with MAC Authentication Bypass
275
Network Admission Control Layer 2 802.1X Validation
276
Flexible Authentication Ordering
277
Open1X Authentication
277
Multidomain Authentication
278
Voice Aware 802.1X Security
279
X Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT)
279
Guidelines
280
Common Session ID
280
Configuring 802.1X Authentication
281
Default 802.1X Authentication Configuration
282
X Authentication Configuration Guidelines
283
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
284
MAC Authentication Bypass
285
Maximum Number of Allowed Devices Per Port
285
Configuring 802.1X Authentication
286
Configuring 802.1X Violation Modes
286
Configuring 802.1X Readiness Check
288
Configuring Voice Aware 802.1X Security
289
Configuring the Switch-To-RADIUS-Server Communication
290
Configuring the Host Mode
292
Configuring Periodic Re-Authentication
293
Changing the Quiet Period
294
Changing the Switch-To-Client Retransmission Time
294
Manually Re-Authenticating a Client Connected to a Port
294
Setting the Switch-To-Client Frame-Retransmission Number
295
Setting the Re-Authentication Number
296
Enabling MAC Move
296
Enabling MAC Replace
297
Configuring 802.1X Accounting
298
Configuring a Guest VLAN
299
Configuring a Restricted VLAN
300
Configuring the Inaccessible Authentication Bypass Feature
301
Configuring 802.1X User Distribution
304
Configuring 802.1X Authentication with Wol
305
Configuring MAC Authentication Bypass
305
Configuring NAC Layer 2 802.1X Validation
306
Configuring an Authenticator and a Supplicant Switch with NEAT
307
Configuring NEAT with ASP
308
Configuring 802.1X Authentication with Downloadable Acls and Redirect Urls
308
Configuring Downloadable Acls
309
Configuring a Downloadable Policy
310
Configuring VLAN ID-Based MAC Authentication
311
Configuring Flexible Authentication Ordering
312
Configuring Open1X
312
Disabling 802.1X Authentication on the Port
313
Resetting the 802.1X Authentication Configuration to the Default Values
314
Displaying 802.1X Statistics and Status
314
Understanding Web-Based Authentication
315
C H a P T E R 10 Configuring Web-Based Authentication
316
Device Roles
316
Host Detection
316
Authentication Process
317
Session Creation
317
Local Web Authentication Banner
318
Web Authentication Customizable Web Pages
320
Guidelines
320
Web-Based Authentication Interactions with Other Features
321
Port Security
321
Gateway IP
322
Acls
322
Context-Based Access Control
322
X Authentication
322
Etherchannel
322
Configuring Web-Based Authentication
323
Default Web-Based Authentication Configuration
323
Web-Based Authentication Configuration Guidelines and Restrictions
323
Web-Based Authentication Configuration Task List
324
Configuring the Authentication Rule and Interfaces
324
Configuring AAA Authentication
325
Configuring Switch-To-RADIUS-Server Communication
325
Configuring the HTTP Server
327
Customizing the Authentication Proxy Web Pages
327
Specifying a Redirection URL for Successful Login
329
Configuring the Web-Based Authentication Parameters
329
Configuring a Web Authentication Local Banner
330
Removing Web-Based Authentication Cache Entries
330
Displaying Web-Based Authentication Status
331
CHAPTER 11 Configuring Interface Characteristics11-1
333
Understanding Interface Types
333
C H a P T E R 11 Configuring Interface Characteristics
334
Port-Based Vlans
334
Switch Ports
334
Access Ports
335
Trunk Ports
335
Tunnel Ports
335
Routed Ports
336
Switch Virtual Interfaces
336
SVI Autostate Exclude
337
Etherchannel Port Groups
338
Gigabit Ethernet Interfaces
338
Connecting Interfaces
338
Using Interface Configuration Mode
340
Procedures for Configuring Interfaces
341
Configuring a Range of Interfaces
341
Configuring and Using Interface Range Macros
344
Using the Internal Ethernet Management Port
345
Understanding the Internal Ethernet Management Port
345
Supported Features on the Ethernet Management Port
349
Layer 3 Routing Configuration Guidelines
349
Monitoring the Ethernet Management Port
350
TFTP and the Ethernet Management Port
350
Configuring Ethernet Interfaces
350
Default Ethernet Interface Configuration
351
Configuring Interface Speed and Duplex Mode
352
Speed and Duplex Configuration Guidelines
352
Setting the Interface Speed and Duplex Parameters
353
Configuring IEEE 802.3X Flow Control
354
Configuring Auto-MDIX on an Interface
355
Adding a Description for an Interface
356
Configuring Layer 3 Interfaces
357
Configuring SVI Autostate Exclude
358
Configuring the System MTU
359
Monitoring and Maintaining the Interfaces
361
Monitoring Interface Status
361
Clearing and Resetting Interfaces and Counters
362
Shutting down and Restarting the Interface
362
CHAPTER 12 Configuring Smartports Macros12-1
363
Understanding Smartports Macros
363
C H a P T E R 12 Configuring Smartports Macros
364
Default Smartports Macro Configuration
364
Smartports Macro Configuration Guidelines
364
Creating Smartports Macros
366
Applying Smartports Macros
367
Applying Cisco-Default Smartports Macros
368
Displaying Smartports Macros
370
Understanding Vlans
371
Supported Vlans
372
Chapter 13 Configuring VLAN
373
VLAN Port Membership Modes
373
Configuring Normal-Range Vlans
374
Normal-Range VLAN Configuration Guidelines
376
Token Ring Vlans
376
Configuring Normal-Range Vlans
377
Default Ethernet VLAN Configuration
378
Creating or Modifying an Ethernet VLAN
378
Deleting a VLAN
379
Assigning Static-Access Ports to a VLAN
380
Configuring Extended-Range Vlans
381
Default VLAN Configuration
381
Extended-Range VLAN Configuration Guidelines
381
Creating an Extended-Range VLAN
382
Creating an Extended-Range VLAN with an Internal VLAN ID
383
Displaying Vlans
384
Configuring VLAN Trunks
385
Trunking Overview
385
IEEE 802.1Q Configuration Considerations
387
Default Layer 2 Ethernet Interface VLAN Configuration
387
Configuring an Ethernet Interface as a Trunk Port
388
Interaction with Other Features
388
Configuring a Trunk Port
389
Defining the Allowed Vlans on a Trunk
390
Changing the Pruning-Eligible List
391
Configuring the Native VLAN for Untagged Traffic
392
Configuring Trunk Ports for Load Sharing
392
Load Sharing Using STP Port Priorities
393
Load Sharing Using STP Path Cost
394
Configuring VMPS
396
Understanding VMPS
396
Dynamic-Access Port VLAN Membership
397
Default VMPS Client Configuration
397
VMPS Configuration Guidelines
398
Configuring the VMPS Client
398
Entering the IP Address of the VMPS
398
Configuring Dynamic-Access Ports on VMPS Clients
399
Reconfirming VLAN Memberships
399
Changing the Reconfirmation Interval
400
Changing the Retry Count
400
Monitoring the VMPS
400
Troubleshooting Dynamic-Access Port VLAN Membership
401
VMPS Configuration Example
401
Understanding VTP
403
Chapter 14 Configuring VTP
404
The VTP Domain
404
VTP Modes
405
VTP Advertisements
406
VTP Version 2
406
VTP Version 3
407
VTP Pruning
408
Configuring VTP
410
Default VTP Configuration
410
VTP Configuration Guidelines
411
Domain Names
411
Passwords
412
VTP Version
412
Configuration Requirements
413
Configuring VTP Mode
413
Configuring a VTP Version 3 Password
415
Configuring a VTP Version 3 Primary Server
416
Enabling the VTP Version
417
Enabling VTP Pruning
418
Configuring VTP on a Per-Port Basis
418
Adding a VTP Client Switch to a VTP Domain
419
Monitoring VTP
420
Understanding Voice VLAN
421
Chapter 15 Configuring Voice VLAN
422
VTP and Switch Stacks
410
Cisco IP Phone Data Traffic
422
Cisco IP Phone Voice Traffic
422
Configuring Voice VLAN
423
Default Voice VLAN Configuration
423
Voice VLAN Configuration Guidelines
423
Configuring a Port Connected to a Cisco 7960 IP Phone
424
Configuring Cisco IP Phone Voice Traffic
425
Configuring the Priority of Incoming Data Frames
426
Displaying Voice VLAN
427
Understanding Private Vlans
429
Chapter 16 Configuring Private VLAN
430
IP Addressing Scheme with Private Vlans
431
Private Vlans Across Multiple Switches
432
Private-VLAN Interaction with Other Features
433
Private Vlans and Unicast, Broadcast, and Multicast Traffic
433
Private Vlans and Svis
433
Private Vlans and Switch Stacks
434
Configuring Private Vlans
434
Tasks for Configuring Private Vlans
434
Default Private-VLAN Configuration
435
Private-VLAN Configuration Guidelines
435
Secondary and Primary VLAN Configuration
435
Private-VLAN Port Configuration
437
Limitations with Other Features
437
Configuring and Associating Vlans in a Private VLAN
438
Configuring a Layer 2 Interface as a Private-VLAN Host Port
440
Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port
441
Mapping Secondary Vlans to a Primary VLAN Layer 3 VLAN Interface
442
Monitoring Private Vlans
443
CHAPTER 17 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling
445
Understanding IEEE 802.1Q Tunneling
445
C H a P T E R 17 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling
446
Configuring IEEE 802.1Q Tunneling
448
Default IEEE 802.1Q Tunneling Configuration
448
IEEE 802.1Q Tunneling Configuration Guidelines
448
Native Vlans
448
System MTU
449
IEEE 802.1Q Tunneling and Other Features
450
Configuring an IEEE 802.1Q Tunneling Port
450
Understanding Layer 2 Protocol Tunneling
451
Configuring Layer 2 Protocol Tunneling
454
Default Layer 2 Protocol Tunneling Configuration
455
Layer 2 Protocol Tunneling Configuration Guidelines
456
Configuring Layer 2 Protocol Tunneling
457
Configuring Layer 2 Tunneling for Etherchannels
458
Configuring the SP Edge Switch
458
Configuring the Customer Switch
460
Monitoring and Maintaining Tunneling Status
462
Understanding Spanning-Tree Features
463
Chapter 18 Configuring STP
464
STP Overview
464
Spanning-Tree Topology and Bpdus
465
Bridge ID, Switch Priority, and Extended System ID
466
Spanning-Tree Interface States
467
Blocking State
468
Listening State
469
Learning State
469
Forwarding State
469
Disabled State
469
How a Switch or Port Becomes the Root Switch or Root Port
470
Spanning Tree and Redundant Connectivity
470
Accelerated Aging to Retain Connectivity
471
Spanning-Tree Address Management
471
Spanning-Tree Modes and Protocols
472
Supported Spanning-Tree Instances
472
Spanning-Tree Interoperability and Backward Compatibility
473
STP and IEEE 802.1Q Trunks
473
Spanning Tree and Switch Stacks
474
VLAN-Bridge Spanning Tree
474
Configuring Spanning-Tree Features
475
Default Spanning-Tree Configuration
475
Spanning-Tree Configuration Guidelines
476
Changing the Spanning-Tree Mode
477
Disabling Spanning Tree
478
Configuring the Root Switch
478
Configuring a Secondary Root Switch
480
Configuring Port Priority
480
Configuring Path Cost
482
Configuring the Switch Priority of a VLAN
483
Configuring Spanning-Tree Timers
484
Configuring the Hello Time
484
Configuring the Forwarding-Delay Time for a VLAN
485
Configuring the Maximum-Aging Time for a VLAN
485
Configuring the Transmit Hold-Count
486
Displaying the Spanning-Tree Status
486
Chapter 19 Configuring MSTP
488
Understanding MSTP
488
Multiple Spanning-Tree Regions
488
IST, CIST, and CST
489
Operations Within an MST Region
489
Operations between MST Regions
490
IEEE 802.1S Terminology
491
Hop Count
491
Boundary Ports
492
IEEE 802.1S Implementation
492
Port Role Naming Change
493
Interoperation between Legacy and Standard Switches
493
Detecting Unidirectional Link Failure
494
MSTP and Switch Stacks
494
Interoperability with IEEE 802.1D STP
495
Understanding RSTP
495
Port Roles and the Active Topology
495
Rapid Convergence
496
Synchronization of Port Roles
498
Bridge Protocol Data Unit Format and Processing
499
Processing Superior BPDU Information
499
Processing Inferior BPDU Information
500
Topology Changes
500
Configuring MSTP Features
501
Default MSTP Configuration
501
MSTP Configuration Guidelines
502
Specifying the MST Region Configuration and Enabling MSTP
503
Configuring the Root Switch
504
Configuring a Secondary Root Switch
505
Configuring Port Priority
506
Configuring Path Cost
508
Configuring the Switch Priority
509
Configuring the Hello Time
509
Configuring the Forwarding-Delay Time
510
Configuring the Maximum-Aging Time
511
Configuring the Maximum-Hop Count
511
Specifying the Link Type to Ensure Rapid Transitions
512
Designating the Neighbor Type
512
Restarting the Protocol Migration Process
513
Displaying the MST Configuration and Status
513
CHAPTER 20 Configuring Optional Spanning-Tree Features
515
Understanding Optional Spanning-Tree Features
515
C H a P T E R 20 Configuring Optional Spanning-Tree Features
516
Understanding Port Fast
516
Understanding BPDU Guard
517
Understanding BPDU Filtering
517
Understanding Uplinkfast
518
Understanding Cross-Stack Uplinkfast
519
How CSUF Works
520
Events that Cause Fast Convergence
521
Understanding Backbonefast
521
Understanding Etherchannel Guard
524
Understanding Root Guard
524
Understanding Loop Guard
525
Configuring Optional Spanning-Tree Features
525
Default Optional Spanning-Tree Configuration
526
Optional Spanning-Tree Configuration Guidelines
526
Enabling Port Fast
526
Enabling BPDU Guard
527
Enabling BPDU Filtering
528
Enabling Uplinkfast for Use with Redundant Links
529
Enabling Cross-Stack Uplinkfast
530
Enabling Backbonefast
530
Enabling Etherchannel Guard
531
Enabling Root Guard
532
Enabling Loop Guard
532
Displaying the Spanning-Tree Status
533
Understanding Flex Links and the MAC Address-Table Move Update
535
Flex Links
536
C H a P T E R 21 Configuring Flex Links and the MAC Address-Table Move Update Feature
537
VLAN Flex Link Load Balancing and Support
537
Flex Link Multicast Fast Convergence
537
Learning the Other Flex Link Port as the Mrouter Port
537
Generating IGMP Reports
538
Leaking IGMP Reports
538
Configuration Examples
538
MAC Address-Table Move Update
540
Configuring Flex Links and MAC Address-Table Move Update
541
Configuration Guidelines
542
Default Configuration
542
Configuring Flex Links
543
Configuring VLAN Load Balancing on Flex Links
545
Configuring the MAC Address-Table Move Update Feature
546
Monitoring Flex Links and the MAC Address-Table Move Update Information
548
CHAPTER 22 Configuring DHCP Features and IP Source Guard
549
Understanding DHCP Features
549
C H a P T E R 22 Configuring DHCP Features and IP Source Guard
550
DHCP Server
550
DHCP Relay Agent
550
DHCP Snooping
550
Option-82 Data Insertion
551
Cisco IOS DHCP Server Database
554
DHCP Snooping Binding Database
554
Configuring DHCP Features
556
Default DHCP Configuration
556
DHCP Snooping Configuration Guidelines
557
Configuring the DHCP Server
558
DHCP Server and Switch Stacks
558
Configuring the DHCP Relay Agent
559
Specifying the Packet Forwarding Address
559
Enabling DHCP Snooping and Option 82
560
Enabling DHCP Snooping on Private Vlans
562
Enabling the Cisco IOS DHCP Server Database
562
Enabling the DHCP Snooping Binding Database Agent
563
DHCP Snooping and Switch Stacks
556
Displaying DHCP Snooping Information
564
Understanding IP Source Guard
564
Source IP Address Filtering
565
Source IP and MAC Address Filtering
565
IP Source Guard for Static Hosts
565
Configuring IP Source Guard
566
Default IP Source Guard Configuration
566
IP Source Guard Configuration Guidelines
566
Enabling IP Source Guard
567
Configuring IP Source Guard for Static Hosts
569
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port
569
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port
572
Displaying IP Source Guard Information
574
Understanding DHCP Server Port-Based Address Allocation
574
Configuring DHCP Server Port-Based Address Allocation
575
Default Port-Based Address Allocation Configuration
575
Port-Based Address Allocation Configuration Guidelines
575
Enabling DHCP Server Port-Based Address Allocation
575
Displaying DHCP Server Port-Based Address Allocation
578
CHAPTER 23 Configuring Dynamic ARP Inspection23-1
579
Understanding Dynamic ARP Inspection
579
C H a P T E R 23 Configuring Dynamic ARP Inspection
580
Interface Trust States and Network Security
581
Rate Limiting of ARP Packets
582
Relative Priority of ARP Acls and DHCP Snooping Entries
582
Logging of Dropped Packets
583
Configuring Dynamic ARP Inspection
583
Default Dynamic ARP Inspection Configuration
583
Dynamic ARP Inspection Configuration Guidelines
584
Configuring Dynamic ARP Inspection in DHCP Environments
585
Configuring ARP Acls for Non-DHCP Environments
586
Limiting the Rate of Incoming ARP Packets
588
Performing Validation Checks
590
Configuring the Log Buffer
591
Displaying Dynamic ARP Inspection Information
592
Chapter 24 Configuring IGMP Snooping and MVR
596
Understanding IGMP Snooping
596
IGMP Versions
597
Joining a Multicast Group
597
Leaving a Multicast Group
599
IGMP Configurable-Leave Timer
600
IGMP Report Suppression
600
Immediate Leave
600
Configuring IGMP Snooping
601
Default IGMP Snooping Configuration
601
Enabling or Disabling IGMP Snooping
602
Setting the Snooping Method
603
Configuring a Multicast Router Port
604
Configuring a Blade Server Statically to Join a Group
605
Enabling IGMP Immediate Leave
605
Configuring the IGMP Leave Timer
606
Configuring TCN-Related Commands
607
Controlling the Multicast Flooding Time after a TCN Event
607
Recovering from Flood Mode
607
Disabling Multicast Flooding During a TCN Event
608
Configuring the IGMP Snooping Querier
609
Disabling IGMP Report Suppression
610
Displaying IGMP Snooping Information
611
Understanding Multicast VLAN Registration
612
Using MVR in a Multicast Television Application
613
IGMP Snooping and Switch Stacks
601
Configuring MVR
614
Default MVR Configuration
614
MVR Configuration Guidelines and Limitations
615
Configuring MVR Global Parameters
615
Configuring MVR Interfaces
616
Configuring IGMP Filtering and Throttling
618
Default IGMP Filtering and Throttling Configuration
619
Configuring IGMP Profiles
619
Applying IGMP Profiles
621
Setting the Maximum Number of IGMP Groups
621
Configuring the IGMP Throttling Action
622
Displaying MVR Information
618
Displaying IGMP Filtering and Throttling Configuration
623
Understanding MLD Snooping
625
Chapter 25 Configuring Ipv6 MLD Snooping
626
MLD Messages
626
MLD Queries
627
Multicast Client Aging Robustness
627
Multicast Router Discovery
627
MLD Done Messages and Immediate-Leave
628
MLD Reports
628
Configuring Ipv6 MLD Snooping
629
Default MLD Snooping Configuration
629
MLD Snooping Configuration Guidelines
630
Enabling or Disabling MLD Snooping
631
Configuring a Static Multicast Group
632
Enabling MLD Immediate Leave
633
Configuring a Multicast Router Port
633
Configuring MLD Snooping Queries
634
Disabling MLD Listener Message Suppression
635
MLD Snooping in Switch Stacks
629
Topology Change Notification Processing
629
Displaying MLD Snooping Information
636
CHAPTER 26 Configuring Port-Based Traffic Control26-1
639
Configuring Storm Control
639
C H a P T E R 26 Configuring Port-Based Traffic Control
640
Understanding Storm Control
640
Default Storm Control Configuration
641
Configuring Storm Control and Threshold Levels
641
Configuring Small-Frame Arrival Rate
643
Configuring Protected Ports
644
Default Protected Port Configuration
645
Protected Port Configuration Guidelines
645
Configuring a Protected Port
645
Configuring Port Blocking
646
Default Port Blocking Configuration
646
Blocking Flooded Traffic on an Interface
646
Configuring Port Security
647
Understanding Port Security
647
Secure MAC Addresses
647
Security Violations
648
Default Port Security Configuration
649
Port Security Configuration Guidelines
650
Enabling and Configuring Port Security
651
Enabling and Configuring Port Security Aging
656
Port Security and Switch Stacks
657
Port Security and Private Vlans
658
Configuring Protocol Storm Protection
659
Understanding Protocol Storm Protection
659
Default Protocol Storm Protection Configuration
659
Enabling Protocol Storm Protection
660
Displaying Port-Based Traffic Control Settings
661
Understanding CDP
663
CDP and Switch Stacks
664
Configuring CDP
664
Default CDP Configuration
664
Chapter 27 Configuring CDP
665
Configuring the CDP Characteristics
665
Disabling and Enabling CDP
665
Disabling and Enabling CDP on an Interface
666
Monitoring and Maintaining CDP
667
C H a P T E R 28 Configuring LLDP, LLDP-MED, and Wired Location Service
670
CHAPTER 28 Configuring LLDP, LLDP-MED, and Wired Location Service
670
Understanding LLDP, LLDP-MED, and Wired Location Service
670
Lldp
670
Lldp-Med
671
Wired Location Service
672
Configuration Guidelines
673
Configuring LLDP Characteristics
674
Enabling LLDP
674
Configuring LLDP-MED Tlvs
675
Configuring Network-Policy TLV
675
Configuring Location TLV and Wired Location Service
677
Configuring LLDP, LLDP-MED, and Wired Location Service
673
Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service
680
Understanding UDLD
681
Modes of Operation
681
Chapter 29 Configuring UDLD
682
Methods to Detect Unidirectional Links
682
Configuring UDLD
684
Default UDLD Configuration
684
Configuration Guidelines
684
Enabling UDLD Globally
685
Enabling UDLD on an Interface
686
Resetting an Interface Disabled by UDLD
686
Displaying UDLD Status
687
Understanding SPAN and RSPAN
689
Chapter 30 Configuring SPAN and RSPAN
690
Local SPAN
690
Remote SPAN
691
SPAN and RSPAN Concepts and Terminology
692
SPAN Sessions
692
Monitored Traffic
693
Source Ports
694
Source Vlans
695
VLAN Filtering
695
Destination Port
696
Rspan Vlan
697
SPAN and RSPAN Interaction with Other Features
697
SPAN and RSPAN and Switch Stacks
698
Understanding Flow-Based SPAN
698
Configuring SPAN and RSPAN
699
Configuring Local SPAN
700
SPAN Configuration Guidelines
700
Creating a Local SPAN Session
701
Creating a Local SPAN Session and Configuring Incoming Traffic
703
Specifying Vlans to Filter
704
Default SPAN and RSPAN Configuration
700
Configuring RSPAN
705
RSPAN Configuration Guidelines
706
Configuring a VLAN as an RSPAN VLAN
706
Creating an RSPAN Source Session
707
Specifying Vlans to Filter
709
Creating an RSPAN Destination Session
710
Creating an RSPAN Destination Session and Configuring Incoming Traffic
711
Configuration Guidelines
712
Configuring an FSPAN Session
713
Configuring an FRSPAN Session
715
Configuring FSPAN and FRSPAN
712
Displaying SPAN and RSPAN Status
717
Configuring Rmon
719
Chapter 31 Configuring RMON
720
Understanding RMON
720
Configuring RMON
721
Default RMON Configuration
721
Configuring RMON Alarms and Events
721
Collecting Group History Statistics on an Interface
723
Collecting Group Ethernet Statistics on an Interface
724
Displaying RMON Status
724
Understanding System Message Logging
725
Configuring System Message Logging
726
System Log Message Format
726
C H a P T E R 32 Configuring System Message Logging
727
Default System Message Logging Configuration
728
Disabling Message Logging
728
Setting the Message Display Destination Device
729
Synchronizing Log Messages
730
Enabling and Disabling Time Stamps on Log Messages
732
Enabling and Disabling Sequence Numbers in Log Messages
732
Defining the Message Severity Level
733
Limiting Syslog Messages Sent to the History Table and to SNMP
734
Enabling the Configuration-Change Logger
735
Configuring UNIX Syslog Servers
736
Logging Messages to a UNIX Syslog Daemon
737
Configuring the UNIX System Logging Facility
737
Displaying the Logging Configuration
738
Understanding SNMP
739
Chapter 33 Configuring SNMP
740
SNMP Versions
740
SNMP Manager Functions
741
SNMP Agent Functions
742
SNMP Community Strings
742
Using SNMP to Access MIB Variables
742
SNMP Ifindex MIB Object Values
743
SNMP Notifications
743
Configuring SNMP
744
Default SNMP Configuration
744
SNMP Configuration Guidelines
744
Disabling the SNMP Agent
745
Configuring Community Strings
746
Configuring SNMP Groups and Users
747
Configuring SNMP Notifications
750
Setting the CPU Threshold Notification Types and Values
754
Setting the Agent Contact and Location Information
754
Limiting TFTP Servers Used through SNMP
755
SNMP Examples
756
Displaying SNMP Status
757
Understanding Embedded Event Manager
759
C H a P T E R 34 Configuring Embedded Event Manager
761
Event Detectors
761
Embedded Event Manager Actions
762
Embedded Event Manager Policies
762
Embedded Event Manager Environment Variables
763
Configuring Embedded Event Manager
764
Registering and Defining an Embedded Event Manager Applet
764
Registering and Defining an Embedded Event Manager TCL Script
765
Displaying Embedded Event Manager Information
766
C H a P T E R 35 Configuring Network Security with Acls
768
CHAPTER 35 Configuring Network Security with Acls
768
Understanding Acls
768
Supported Acls
768
Port Acls
769
Router Acls
770
VLAN Maps
771
Handling Fragmented and Unfragmented Traffic
772
Acls and Switch Stacks
773
Configuring Ipv4 Acls
773
Creating Standard and Extended Ipv4 Acls
774
Access List Numbers
774
ACL Logging
775
Creating a Numbered Standard ACL
776
Creating a Numbered Extended ACL
777
Resequencing Aces in an ACL
781
Creating Named Standard and Extended Acls
781
Using Time Ranges with Acls
783
Including Comments in Acls
785
Applying an Ipv4 ACL to a Terminal Line
785
Applying an Ipv4 ACL to an Interface
786
Hardware and Software Treatment of IP Acls
788
Troubleshooting Acls
788
Ipv4 ACL Configuration Examples
789
Numbered Acls
791
Extended Acls
791
Named Acls
792
Time Range Applied to an IP ACL
792
Commented IP ACL Entries
793
ACL Logging
793
Creating Named MAC Extended Acls
794
Applying a MAC ACL to a Layer 2 Interface
795
Configuring VLAN Maps
796
VLAN Map Configuration Guidelines
797
Creating a VLAN Map
798
Examples of Acls and VLAN Maps
799
Applying a VLAN Map to a VLAN
801
Using VLAN Maps in Your Network
801
Denying Access to a Server on Another VLAN
801
Configuring VACL Logging
802
Using VLAN Maps with Router Acls
804
Examples of Router Acls and VLAN Maps Applied to Vlans
805
Acls and Switched Packets
805
Acls and Bridged Packets
806
Acls and Routed Packets
807
Acls and Multicast Packets
807
VLAN Maps and Router ACL Configuration Guidelines
805
Displaying Ipv4 ACL Configuration
808
Understanding Ipv6 Acls
811
Chapter 36 Configuring Ipv6 ACL
812
Ipv6 ACL Limitations
812
Supported ACL Features
812
Configuring Ipv6 Acls
813
Default Ipv6 ACL Configuration
814
Interaction with Other Features and Switches
814
Creating Ipv6 Acls
814
Applying an Ipv6 ACL to an Interface
814
Applying an Ipv6 Acl to an Interface
817
Displaying Ipv6 Acls
818
Displaying Ipv6 Acls
819
Ipv6 Acls and Switch Stacks
813
Configuring Qos
821
Understanding Qos
822
Chapter 37 Configuring Qo
823
Basic Qos Model
824
Classification
825
Classification Based on Qos Acls
828
Classification Based on Class Maps and Policy Maps
828
Policing and Marking
829
Policing on Physical Ports
830
Policing on Svis
831
Mapping Tables
833
Queueing and Scheduling Overview
834
Weighted Tail Drop
834
SRR Shaping and Sharing
835
Queueing and Scheduling on Ingress Queues
836
Queueing and Scheduling on Egress Queues
838
Packet Modification
840
Configuring Auto-Qos
841
Generated Auto-Qos Configuration
842
VOIP Device Specifics
842
Enhanced Auto-Qos for Video, Trust, and Classification
844
Auto-Qos Configuration Migration
844
Global Auto-Qos Configuration
845
Auto-Qos Generated Configuration for Voip Devices
848
Auto-Qos Generated Configuration for Enhanced Video, Trust, and Classify Devices
849
Effects of Auto-Qos on the Configuration
852
Auto-Qos Configuration Guidelines
852
Auto-Qos Voip Considerations
853
Auto-Qos Enhanced Considerations
853
Enabling Auto-Qos
853
Troubleshooting Auto Qos Commands
854
Configuring Standard Qos
855
Default Standard Qos Configuration
856
Default Ingress Queue Configuration
856
Default Egress Queue Configuration
857
Default Mapping Table Configuration
858
Standard Qos Configuration Guidelines
858
Qos ACL Guidelines
858
Ipv6 Qos ACL Guidelines
858
Applying Qos on Interfaces
859
Configuring Ipv6 Qos on Switch Stacks
859
Policing Guidelines
860
General Qos Guidelines
860
Enabling Qos Globally
861
Enabling VLAN-Based Qos on Physical Ports
861
Configuring Classification Using Port Trust States
862
Configuring the Trust State on Ports Within the Qos Domain
862
Configuring the Cos Value for an Interface
863
Configuring a Trusted Boundary to Ensure Port Security
864
Enabling DSCP Transparency Mode
866
Configuring the DSCP Trust State on a Port Bordering Another Qos Domain
866
Configuring a Qos Policy
868
Classifying Traffic by Using Acls
869
Classifying Traffic by Using Class Maps
874
Classifying Traffic by Using Class Maps and Filtering Ipv6 Traffic
877
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
879
Classifying, Policing, and Marking Traffic on Svis by Using Hierarchical Policy Maps
883
Classifying, Policing, and Marking Traffic by Using Aggregate Policers
892
Configuring DSCP Maps
895
Configuring the Cos-To-DSCP Map
895
Configuring the IP-Precedence-To-DSCP Map
896
Configuring the Policed-DSCP Map
897
Configuring the DSCP-To-Cos Map
898
Configuring the DSCP-To-DSCP-Mutation Map
899
Configuring Ingress Queue Characteristics
901
Mapping DSCP or Cos Values to an Ingress Queue and Setting WTD Thresholds
902
Allocating Buffer Space between the Ingress Queues
903
Allocating Bandwidth between the Ingress Queues
903
Configuring the Ingress Priority Queue
904
Configuring Egress Queue Characteristics
905
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
906
Configuration Guidelines
906
Mapping DSCP or Cos Values to an Egress Queue and to a Threshold ID
908
Configuring SRR Shaped Weights on Egress Queues
910
Configuring SRR Shared Weights on Egress Queues
911
Configuring the Egress Expedite Queue
912
Limiting the Bandwidth on an Egress Interface
912
Displaying Auto-Qos Information
855
Displaying Standard Qos Information
913
CHAPTER 38 Configuring Etherchannels and Link-State Tracking
915
Understanding Etherchannels
915
C H a P T E R 38 Configuring Etherchannels and Link-State Tracking
916
Etherchannel Overview
916
Port-Channel Interfaces
918
Port Aggregation Protocol
919
Pagp Modes
919
Pagp Interaction with Virtual Switches and Dual-Active Detection
920
Pagp Interaction with Other Features
920
Link Aggregation Control Protocol
920
LACP Modes
921
LACP Interaction with Other Features
921
Etherchannel on Mode
921
Load-Balancing and Forwarding Methods
922
Etherchannel and Switch Stacks
923
Configuring Etherchannels
924
Default Etherchannel Configuration
924
Etherchannel Configuration Guidelines
925
Configuring Layer 2 Etherchannels
926
Configuring Layer 3 Etherchannels
929
Creating Port-Channel Logical Interfaces
929
Configuring the Physical Interfaces
930
Configuring Etherchannel Load-Balancing
932
Configuring the Pagp Learn Method and Priority
933
Configuring LACP Hot-Standby Ports
934
Configuring the LACP System Priority
935
Configuring the LACP Port Priority
936
Displaying Etherchannel, Pagp, and LACP Status
937
Understanding Link-State Tracking
937
Configuring Link-State Tracking
939
Default Link-State Tracking Configuration
939
Link-State Tracking Configuration Guidelines
939
Configuring Link-State Tracking
940
Displaying Link-State Tracking Status
941
Configuring Ip Unicast Routing
943
Understanding IP Routing
944
Types of Routing
944
Steps for Configuring Routing
947
Configuring IP Addressing
947
Default Addressing Configuration
948
Assigning IP Addresses to Network Interfaces
949
Use of Subnet Zero
949
Classless Routing
950
Configuring Address Resolution Methods
951
Define a Static ARP Cache
952
Set ARP Encapsulation
953
Enable Proxy ARP
954
Routing Assistance When IP Routing Is Disabled
954
Default Gateway
954
ICMP Router Discovery Protocol (IRDP)
955
Configuring Broadcast Packet Handling
956
Enabling Directed Broadcast-To-Physical Broadcast Translation
957
Forwarding UDP Broadcast Packets and Protocols
958
Establishing an IP Broadcast Address
958
Flooding IP Broadcasts
959
Monitoring and Maintaining IP Addressing
960
Chapter 39 Configuring IP Unicast Routing
945
IP Routing and Switch Stacks
945
Enabling IP Unicast Routing
961
Configuring RIP
962
Default RIP Configuration
963
Configuring Basic RIP Parameters
964
Configuring RIP Authentication
965
Configuring Summary Addresses and Split Horizon
966
Configuring Split Horizon
967
Configuring OSPF
967
Default OSPF Configuration
970
OSPF for Routed Access
972
OSPF Nonstop Forwarding
972
Configuring Basic OSPF Parameters
973
Configuring OSPF Interfaces
974
Configuring OSPF Area Parameters
975
Configuring Other OSPF Parameters
977
Changing LSA Group Pacing
978
Configuring a Loopback Interface
979
Monitoring OSPF
980
Configuring EIGRP
980
Default EIGRP Configuration
982
EIGRP Nonstop Forwarding
984
Configuring Basic EIGRP Parameters
985
Configuring EIGRP Interfaces
986
Configuring EIGRP Route Authentication
987
EIGRP Stub Routing
988
Monitoring and Maintaining EIGRP
988
Configuring BGP
989
Default BGP Configuration
991
Nonstop Forwarding Awareness
994
Enabling BGP Routing
994
Managing Routing Policy Changes
997
Configuring BGP Decision Attributes
998
Configuring BGP Filtering with Route Maps
1000
Configuring BGP Filtering by Neighbor
1001
Configuring Prefix Lists for BGP Filtering
1002
Configuring BGP Community Filtering
1003
Configuring BGP Neighbors and Peer Groups
1005
Configuring Aggregate Addresses
1007
Configuring Routing Domain Confederations
1007
Configuring BGP Route Reflectors
1008
Configuring Route Dampening
1009
Monitoring and Maintaining BGP
1010
Configuring ISO CLNS Routing
1011
Configuring IS-IS Dynamic Routing
1012
Default IS-IS Configuration
1013
Enabling IS-IS Routing
1014
Nonstop Forwarding Awareness
1014
Configuring IS-IS Global Parameters
1016
Configuring IS-IS Interface Parameters
1018
Monitoring and Maintaining ISO IGRP and IS-IS
1021
Configuring Multi-VRF CE
1022
Understanding Multi-VRF CE
1022
Default Multi-VRF CE Configuration
1024
Multi-VRF CE Configuration Guidelines
1024
Configuring Vrfs
1025
Configuring VRF-Aware Services
1026
User Interface for ARP
1027
User Interface for PING
1027
User Interface for SNMP
1027
User Interface for HSRP
1028
User Interface for Unicast RPF
1028
User Interface for Syslog
1029
User Interface for Traceroute
1029
User Interface for FTP and TFTP
1029
User Interface for VRF-Aware RADIUS
1030
Configuring Multicast Vrfs
1030
Configuring a VPN Routing Session
1031
Configuring BGP PE to CE Routing Sessions
1032
Multi-VRF CE Configuration Example
1032
Displaying Multi-VRF CE Status
1036
Configuring Protocol-Independent Features
1037
Configuring Cisco Express Forwarding and Distributed Cisco Express Forwarding
1037
Configuring the Number of Equal-Cost Routing Paths
1039
Configuring Static Unicast Routes
1039
Specifying Default Routes and Networks
1040
Using Route Maps to Redistribute Routing Information
1041
Configuring Policy-Based Routing
1045
PBR Configuration Guidelines
1045
Enabling PBR
1047
Filtering Routing Information
1048
Setting Passive Interfaces
1048
Controlling Advertising and Processing in Routing Updates
1049
Filtering Sources of Routing Information
1050
Managing Authentication Keys
1051
Configuring Unicast Reverse Path Forwarding
1037
Monitoring and Maintaining the IP Network
1053
CHAPTER 40 Configuring Ipv6 Unicast Routing40-1
1055
Understanding Ipv6
1055
C H a P T E R 40 Configuring Ipv6 Unicast Routing
1056
Ipv6 Addresses
1056
Supported Ipv6 Unicast Routing Features
1057
Bit Wide Unicast Addresses
1058
DNS for Ipv6
1058
Path MTU Discovery for Ipv6 Unicast
1058
Icmpv6
1058
Neighbor Discovery
1058
Default Router Preference
1059
Ipv6 Stateless Autoconfiguration and Duplicate Address Detection
1059
Ipv6 Applications
1059
Dual Ipv4 and Ipv6 Protocol Stacks
1060
DHCP for Ipv6 Address Assignment
1060
Static Routes for Ipv6
1061
RIP for Ipv6
1061
OSPF for Ipv6
1061
EIGRP for Ipv6
1061
HSRP for Ipv6
1062
SNMP and Syslog over Ipv6
1062
Unsupported Ipv6 and Unicast Routing Features
1063
Limitations
1063
Ipv6 and Switch Stacks
1064
Configuring Ipv6
1065
Default Ipv6 Configuration
1065
Configuring Ipv6 Addressing and Enabling Ipv6 Host Functions or Routing
1066
Configuring Default Router Preference
1068
Configuring Ipv4 and Ipv6 Protocol Stacks
1069
Configuring DHCP for Ipv6 Address Assignment
1070
Default Dhcpv6 Address Assignment Configuration
1070
Dhcpv6 Address Assignment Configuration Guidelines
1070
Enabling Dhcpv6 Server Function
1071
Enabling Dhcpv6 Client Function
1073
Configuring Ipv6 ICMP Rate Limiting
1074
Configuring CEF and Dcef for Ipv6
1074
Configuring Static Routes for Ipv6
1075
Configuring RIP for Ipv6
1076
Configuring OSPF for Ipv6
1077
Configuring EIGRP for Ipv6
1079
Configuring HSRP for Ipv6
1079
Enabling an HSRP Group for Ipv6
1080
Enabling HSRP Version 2
1080
Displaying Ipv6
1082
Understanding HSRP
1087
Chapter 41 Configuring HSRP and VRRP
1088
HSRP Versions
1089
Multiple HSRP
1090
Configuring HSRP
1091
HSRP and Switch Stacks
1091
Default HSRP Configuration
1092
HSRP Configuration Guidelines
1092
Enabling HSRP
1093
Configuring HSRP Priority
1094
Configuring MHSRP
1096
Configuring HSRP Authentication and Timers
1097
Displaying HSRP Configurations
1098
Enabling HSRP Support for ICMP Redirect Messages
1098
Configuring VRRP
1099
VRRP Limitations
1099
CHAPTER 42 Configuring Cisco IOS IP Slas Operations42-1
1101
Understanding Cisco IOS IP Slas
1101
C H a P T E R 42 Configuring Cisco IOS IP Slas Operations
1102
Using Cisco IOS IP Slas to Measure Network Performance
1103
IP Slas Responder and IP Slas Control Protocol
1104
Response Time Computation for IP Slas
1104
IP Slas Operation Scheduling
1105
IP Slas Operation Threshold Monitoring
1105
Configuring IP Slas Operations
1106
Default Configuration
1106
Configuration Guidelines
1106
Configuring the IP Slas Responder
1107
Analyzing IP Service Levels by Using the UDP Jitter Operation
1108
Analyzing IP Service Levels by Using the ICMP Echo Operation
1111
Monitoring IP Slas Operations
1113
CHAPTER 43 Configuring Enhanced Object Tracking
1115
Understanding Enhanced Object Tracking
1115
C H a P T E R 43 Configuring Enhanced Object Tracking
1116
Configuring Enhanced Object Tracking Features
1116
Default Configuration
1116
Tracking Interface Line-Protocol or IP Routing State
1116
Configuring a Tracked List
1117
Configuring a Tracked List with a Boolean Expression
1117
Configuring a Tracked List with a Weight Threshold
1118
Configuring a Tracked List with a Percentage Threshold
1119
Configuring HSRP Object Tracking
1121
Configuring Other Tracking Characteristics
1122
Configuring IP Slas Object Tracking
1122
Monitoring Enhanced Object Tracking
1124
C H a P T E R 44 Configuring Cache Services by Using WCCP
1126
CHAPTER 44 Configuring Cache Services by Using WCCP44-1
1126
Understanding WCCP
1126
WCCP Message Exchange
1127
WCCP Negotiation
1127
MD5 Security
1128
Packet Redirection and Service Groups
1128
WCCP and Switch Stacks
1129
Unsupported WCCP Features
1129
Configuring WCCP
1129
Default WCCP Configuration
1130
WCCP Configuration Guidelines
1130
Enabling the Cache Service
1131
Monitoring and Maintaining WCCP
1135
Configuring Ip Multicast Routing
1137
C H a P T E R 45 Configuring IP Multicast Routing
1138
Understanding Cisco's Implementation of IP Multicast Routing
1138
Understanding IGMP
1139
IGMP Version 1
1139
IGMP Version 2
1139
Understanding PIM
1140
PIM Versions
1140
PIM Modes
1140
PIM Stub Routing
1141
IGMP Helper
1142
Auto-RP
1143
Bootstrap Router
1143
Multicast Forwarding and Reverse Path Check
1144
Understanding DVMRP
1145
Understanding CGMP
1145
Multicast Routing and Switch Stacks
1146
Configuring IP Multicast Routing
1147
Default Multicast Routing Configuration
1147
Multicast Routing Configuration Guidelines
1147
Pimv1 and Pimv2 Interoperability
1148
Auto-RP and BSR Configuration Guidelines
1148
Configuring Basic Multicast Routing
1149
Configuring Source-Specific Multicast
1151
SSM Components Overview
1151
How SSM Differs from Internet Standard Multicast
1151
SSM IP Address Range
1152
SSM Operations
1152
Igmpv3 Host Signalling
1152
Configuration Guidelines
1153
Configuring SSM
1154
Monitoring SSM
1154
Configuring Source Specific Multicast Mapping
1154
SSM Mapping Overview
1155
Configuration Guidelines
1155
Configuring SSM Mapping
1157
Monitoring SSM Mapping
1159
Configuring Source-Specific Multicast
1159
SSM Components Overview
1159
How SSM Differs from Internet Standard Multicast
1160
SSM IP Address Range
1160
SSM Operations
1160
Igmpv3 Host Signalling
1161
Configuration Guidelines
1161
Monitoring SSM
1162
Configuring SSM
1162
Enabling PIM Stub Routing
1163
Configuring a Rendezvous Point
1164
Manually Assigning an RP to Multicast Groups
1164
Configuring Auto-RP
1166
Configuring Pimv2 BSR
1170
Using Auto-RP and a BSR
1174
Monitoring the RP Mapping Information
1175
Troubleshooting Pimv1 and Pimv2 Interoperability Problems
1175
Configuring Advanced PIM Features
1175
Understanding PIM Shared Tree and Source Tree
1175
Delaying the Use of PIM Shortest-Path Tree
1177
Modifying the PIM Router-Query Message Interval
1178
Configuring Optional IGMP Features
1179
Default IGMP Configuration
1179
Configuring the Switch as a Member of a Group
1179
Controlling Access to IP Multicast Groups
1180
Changing the IGMP Version
1181
Modifying the IGMP Host-Query Message Interval
1182
Changing the IGMP Query Timeout for Igmpv2
1183
Changing the Maximum Query Response Time for Igmpv2
1183
Configuring the Switch as a Statically Connected Member
1184
Configuring Optional Multicast Routing Features
1184
Enabling CGMP Server Support
1185
Configuring Sdr Listener Support
1186
Enabling Sdr Listener Support
1186
Limiting How Long an Sdr Cache Entry Exists
1186
Configuring an IP Multicast Boundary
1187
Configuring Basic DVMRP Interoperability Features
1189
Configuring DVMRP Interoperability
1189
Configuring a DVMRP Tunnel
1191
Advertising Network 0.0.0.0 to DVMRP Neighbors
1193
Responding to Mrinfo Requests
1194
Configuring Advanced DVMRP Interoperability Features
1194
Enabling DVMRP Unicast Routing
1195
Rejecting a DVMRP Nonpruning Neighbor
1196
Controlling Route Exchanges
1198
Limiting the Number of DVMRP Routes Advertised
1198
Changing the DVMRP Route Threshold
1198
Configuring a DVMRP Summary Address
1199
Disabling DVMRP Autosummarization
1201
Adding a Metric Offset to the DVMRP Route
1201
Monitoring and Maintaining IP Multicast Routing
1202
Clearing Caches, Tables, and Databases
1202
Displaying System and Network Statistics
1203
Monitoring IP Multicast Routing
1204
Understanding MSDP
1205
Chapter 46 Configuring MSDP
1206
MSDP Operation
1206
MSDP Benefits
1207
Configuring MSDP
1208
Default MSDP Configuration
1208
Configuring a Default MSDP Peer
1208
Caching Source-Active State
1210
Requesting Source Information from an MSDP Peer
1212
Controlling Source Information that Your Switch Originates
1212
Redistributing Sources
1213
Filtering Source-Active Request Messages
1214
Controlling Source Information that Your Switch Forwards
1216
Using a Filter
1216
Using TTL to Limit the Multicast Data Sent in SA Messages
1217
Controlling Source Information that Your Switch Receives
1219
Configuring an MSDP Mesh Group
1220
Shutting down an MSDP Peer
1221
Including a Bordering PIM Dense-Mode Region in MSDP
1221
Configuring an Originating Address Other than the RP Address
1222
Monitoring and Maintaining MSDP
1223
CHAPTER 47 Configuring Fallback Bridging47-1
1225
Understanding Fallback Bridging
1225
Fallback Bridging Overview
1225
C H a P T E R 47 Configuring Fallback Bridging
1227
Fallback Bridging and Switch Stacks
1227
Default Fallback Bridging Configuration
1228
Fallback Bridging Configuration Guidelines
1228
Creating a Bridge Group
1228
Adjusting Spanning-Tree Parameters
1230
Changing the VLAN-Bridge Spanning-Tree Priority
1230
Changing the Interface Priority
1231
Assigning a Path Cost
1232
Adjusting BPDU Intervals
1232
Disabling the Spanning Tree on an Interface
1234
Monitoring and Maintaining Fallback Bridging
1235
Troubleshooting
1237
Chapter 48 Troubleshooting
1238
Recovering from a Software Failure
1238
Recovering from a Lost or Forgotten Password
1239
Procedure with Password Recovery Enabled
1241
Procedure with Password Recovery Disabled
1243
Preventing Switch Stack Problems
1244
Preventing Autonegotiation Mismatches
1245
SFP Module Security and Identification
1245
Monitoring SFP Module Status
1246
Monitoring Temperature
1246
Using Ping
1246
Understanding Ping
1247
Executing Ping
1247
Using Layer 2 Traceroute
1248
Understanding Layer 2 Traceroute
1248
Usage Guidelines
1248
Displaying the Physical Path
1249
Using IP Traceroute
1249
Understanding IP Traceroute
1250
Executing IP Traceroute
1250
Using TDR
1251
Understanding TDR
1251
Running TDR and Displaying the Results
1252
Using Debug Commands
1252
Enabling All-System Diagnostics
1253
Enabling Debugging on a Specific Feature
1253
Redirecting Debug and Error Message Output
1253
Using the Show Platform Forward Command
1255
Using the Crashinfo Files
1257
Basic Crashinfo Files
1257
Extended Crashinfo Files
1257
Using Memory Consistency Check Routines
1258
Using On-Board Failure Logging
1259
Understanding OBFL
1259
Configuring OBFL
1259
Displaying OBFL Information
1260
Troubleshooting CPU Utilization
1261
Possible Symptoms of High CPU Utilization
1261
Verifying the Problem and Cause
1261
CHAPTER 49 Configuring Online Diagnostics49-1
1263
Understanding Online Diagnostics
1263
C H a P T E R 49 Configuring Online Diagnostics
1264
Scheduling Online Diagnostics
1264
Configuring Health-Monitoring Diagnostics
1265
Running Online Diagnostic Tests
1267
Starting Online Diagnostic Tests
1267
Displaying Online Diagnostic Tests and Test Results
1268
APPENDIX A Working with the Cisco IOS File System, Configuration Files, and Software Images
1269
Working with the Flash File System
1269
Displaying Available File Systems
1270
A P P E N D I X a Working with the Cisco IOS File System, Configuration Files, and Software Images
1271
Setting the Default File System
1271
Displaying Information about Files on a File System
1271
Changing Directories and Displaying the Working Directory
1272
Creating and Removing Directories
1273
Copying Files
1273
Deleting Files
1274
Creating, Displaying, and Extracting Files
1274
Working with Configuration Files
1277
Guidelines for Creating and Using Configuration Files
1278
Configuration File Types and Location
1279
Creating a Configuration File by Using a Text Editor
1279
Copying Configuration Files by Using TFTP
1279
Preparing to Download or Upload a Configuration File by Using TFTP
1280
Downloading the Configuration File by Using TFTP
1280
Uploading the Configuration File by Using TFTP
1281
Copying Configuration Files by Using FTP
1282
Preparing to Download or Upload a Configuration File by Using FTP
1282
Downloading a Configuration File by Using FTP
1283
Uploading a Configuration File by Using FTP
1284
Copying Configuration Files by Using RCP
1285
Preparing to Download or Upload a Configuration File by Using RCP
1286
Downloading a Configuration File by Using RCP
1286
Uploading a Configuration File by Using RCP
1287
Clearing Configuration Information
1288
Clearing the Startup Configuration File
1288
Deleting a Stored Configuration File
1289
Replacing and Rolling Back Configurations
1289
Understanding Configuration Replacement and Rollback
1289
Configuration Guidelines
1290
Configuring the Configuration Archive
1291
Performing a Configuration Replacement or Rollback Operation
1292
Working with Software Images
1293
Image Location on the Switch
1294
File Format of Images on a Server or Cisco.com
1294
Copying Image Files by Using TFTP
1295
Preparing to Download or Upload an Image File by Using TFTP
1296
Downloading an Image File by Using TFTP
1296
Uploading an Image File by Using TFTP
1298
Copying Image Files by Using FTP
1299
Preparing to Download or Upload an Image File by Using FTP
1299
Downloading an Image File by Using FTP
1300
Uploading an Image File by Using FTP
1302
Copying Image Files by Using RCP
1303
Preparing to Download or Upload an Image File by Using RCP
1304
Downloading an Image File by Using RCP
1305
Uploading an Image File by Using RCP
1307
Copying an Image File from One Stack Member to Another
1308
APPENDIX B Unsupported Commands in Cisco IOS Release 12.2(58)SEB-1
1311
Access Control Lists
1311
Unsupported Privileged EXEC Commands
1311
Unsupported Global Configuration Commands
1311
Unsupported Route-Map Configuration Commands
1311
A P P E N D I X B Unsupported Commands in Cisco IOS Release 12.2(58)SE
1312
Archive Commands
1312
Unsupported Privileged EXEC Commands
1312
ARP Commands
1312
Unsupported Global Configuration Commands
1312
Unsupported Interface Configuration Commands
1312
Boot Loader Commands
1312
Unsupported User EXEC Commands
1312
Debug Commands
1313
Unsupported Privileged EXEC Commands
1313
Embedded Event Manager
1313
Unsupported Global Configuration Commands
1313
Unsupported Commands in Applet Configuration Mode
1313
Fallback Bridging
1314
Unsupported Privileged EXEC Commands
1314
Unsupported Global Configuration Commands
1314
Unsupported Interface Configuration Commands
1314
Hsrp
1315
Unsupported Global Configuration Commands
1315
Unsupported Interface Configuration Commands
1316
IGMP Snooping Commands
1316
Unsupported Global Configuration Commands
1316
Interface Commands
1316
Unsupported Privileged EXEC Commands
1316
IP Multicast Routing
1317
Unsupported Privileged EXEC Commands
1317
Unsupported Global Configuration Commands
1317
Unsupported Interface Configuration Commands
1318
IP Unicast Routing
1319
Unsupported Privileged EXEC or User EXEC Commands
1319
Unsupported Global Configuration Commands
1319
Unsupported BGP Router Configuration Commands
1320
Unsupported Interface Configuration Commands
1320
Unsupported VPN Configuration Commands
1320
Unsupported Route Map Commands
1320
MAC Address Commands
1321
Unsupported Privileged EXEC Commands
1321
Unsupported Global Configuration Commands
1321
Miscellaneous
1321
Unsupported User EXEC Commands
1321
Unsupported Privileged EXEC Commands
1322
Unsupported Global Configuration Commands
1322
Msdp
1322
Netflow Commands
1322
Network Address Translation (NAT) Commands
1323
Unsupported Privileged EXEC Commands
1323
Unsupported Global Configuration Command
1323
Unsupported Interface Configuration Commands
1323
Unsupported Policy-Map Configuration Command
1323
Radius
1323
Unsupported Global Configuration Commands
1323
Snmp
1324
Unsupported Global Configuration Commands
1324
Spanning Tree
1324
Unsupported Interface Configuration Command
1324
Vlan
1324
Unsupported User EXEC Commands
1324
Unsupported VLAN Database Commands
1324
Unsupported Privileged EXEC Command
1325
Advertisement
Advertisement
Related Products
Cisco WS-CBS3020-HPQ
Cisco WS-CBS3120X-S
Cisco WS-C2960-8TC-L
Cisco WS-C3750G-24WS-S25
Cisco WS-C3550-48-SMI - Catalyst 3550 10/100 Switch
Cisco WS-C3850-48U-E
Cisco Catalyst WS-C3750X-48
Cisco Catalyst WS-C2960L-SM-24TQ
Cisco WS-C3850-24XU-L
Cisco Catalyst WS-C2960L-8PS-LL
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL