Section |
Page |
Catalyst 3750 SwitchSoftware Configuration Guide |
1 |
Contents |
3 |
Preface |
43 |
Audience |
43 |
Purpose |
43 |
Conventions |
44 |
Related Publications |
44 |
Obtaining Documentation |
46 |
Cisco.com |
46 |
Product Documentation DVD |
46 |
Ordering Documentation |
46 |
Documentation Feedback |
47 |
Cisco Product Security Overview |
47 |
Reporting Security Problems in Cisco Products |
47 |
Product Alerts and Field Notices |
48 |
Obtaining Technical Assistance |
48 |
Cisco Support Website |
48 |
Submitting a Service Request |
49 |
Definitions of Service Request Severity |
49 |
Obtaining Additional Publications and Information |
50 |
Overview |
53 |
Features |
53 |
Ease-of-Deployment and Ease-of-Use Features |
54 |
Performance Features |
56 |
Management Options |
57 |
Manageability Features |
57 |
Availability and Redundancy Features |
58 |
VLAN Features |
59 |
Security Features |
60 |
QoS and CoS Features |
61 |
Layer3 Features |
63 |
Power over Ethernet Features |
64 |
Monitoring Features |
64 |
Default Settings After Initial Switch Configuration |
64 |
Network Configuration Examples |
67 |
Design Concepts for Using the Switch |
68 |
Small to Medium-Sized Network Using Catalyst 3750 Switches |
73 |
Large Network Using Catalyst 3750 Switches |
75 |
Multidwelling Network Using Catalyst 3750 Switches |
77 |
Long-Distance, High-Bandwidth Transport Configuration |
78 |
Where to Go Next |
79 |
Using the Command-Line Interface |
81 |
Understanding Command Modes |
81 |
Understanding the Help System |
83 |
Understanding Abbreviated Commands |
84 |
Understanding no and default Forms of Commands |
84 |
Understanding CLI Error Messages |
85 |
Using Configuration Logging |
85 |
Using Command History |
86 |
Changing the Command History Buffer Size |
86 |
Recalling Commands |
86 |
Disabling the Command History Feature |
87 |
Using Editing Features |
87 |
Enabling and Disabling Editing Features |
87 |
Editing Commands through Keystrokes |
87 |
Editing Command Lines that Wrap |
89 |
Searching and Filtering Output of show and more Commands |
90 |
Accessing the CLI |
90 |
Accessing the CLI through a Console Connection or through Telnet |
90 |
Assigning the Switch IP Address and Default Gateway |
93 |
Understanding the Boot Process |
93 |
Assigning Switch Information |
94 |
Default Switch Information |
95 |
Understanding DHCP-Based Autoconfiguration |
95 |
DHCP Client Request Process |
96 |
Configuring DHCP-Based Autoconfiguration |
97 |
DHCP Server Configuration Guidelines |
97 |
Configuring the TFTP Server |
98 |
Configuring the DNS |
98 |
Configuring the Relay Device |
99 |
Obtaining Configuration Files |
99 |
Example Configuration |
100 |
Manually Assigning IP Information |
102 |
Checking and Saving the Running Configuration |
102 |
Modifying the Startup Configuration |
104 |
Default Boot Configuration |
104 |
Automatically Downloading a Configuration File |
104 |
Specifying the Filename to Read and Write the System Configuration |
104 |
Booting Manually |
105 |
Booting a Specific Software Image |
106 |
Controlling Environment Variables |
107 |
Scheduling a Reload of the Software Image |
108 |
Configuring a Scheduled Reload |
109 |
Displaying Scheduled Reload Information |
110 |
Configuring Cisco IOS CNS Agents |
111 |
Understanding Cisco Configuration Engine Software |
111 |
Configuration Service |
112 |
Event Service |
113 |
NameSpace Mapper |
113 |
What You Should Know About the CNS IDs and Device Hostnames |
113 |
ConfigID |
113 |
DeviceID |
114 |
Hostname and DeviceID |
114 |
Using Hostname, DeviceID, and ConfigID |
114 |
Understanding Cisco IOS Agents |
115 |
Initial Configuration |
115 |
Incremental (Partial) Configuration |
116 |
Synchronized Configuration |
116 |
Configuring Cisco IOS Agents |
116 |
Enabling Automated CNS Configuration |
116 |
Enabling the CNS Event Agent |
118 |
Enabling the Cisco IOS CNS Agent |
119 |
Enabling an Initial Configuration |
119 |
Enabling a Partial Configuration |
121 |
Displaying CNS Configuration |
122 |
Managing Switch Stacks |
123 |
Understanding Switch Stacks |
123 |
Switch Stack Membership |
125 |
Stack Master Election and Re-Election |
126 |
Switch Stack Bridge ID and Router MAC Address |
128 |
Stack Member Numbers |
128 |
Stack Member Priority Values |
129 |
Switch Stack Offline Configuration |
129 |
Effects of Adding a Provisioned Switch to a Switch Stack |
130 |
Effects of Replacing a Provisioned Switch in a Switch Stack |
131 |
Effects of Removing a Provisioned Switch from a Switch Stack |
131 |
Hardware Compatibility and SDM Mismatch Mode in Switch Stacks |
132 |
Switch Stack Software Compatibility Recommendations |
132 |
Stack Protocol Version Compatibility |
132 |
Major Version Number Incompatibility Among Switches |
133 |
Minor Version Number Incompatibility Among Switches |
133 |
Understanding Auto-Upgrade and Auto-Advise |
133 |
Auto-Upgrade and Auto-Advise Example Messages |
134 |
Incompatible Software and Stack Member Image Upgrades |
136 |
Switch Stack Configuration Files |
136 |
Additional Considerations for System-Wide Configuration on Switch Stacks |
137 |
Switch Stack Management Connectivity |
138 |
Connectivity to the Switch Stack Through an IP Address |
138 |
Connectivity to the Switch Stack Through an SSH Session |
138 |
Connectivity to the Switch Stack Through Console Ports |
138 |
Connectivity to Specific Stack Members |
139 |
Switch Stack Configuration Scenarios |
139 |
Configuring the Switch Stack |
141 |
Default Switch Stack Configuration |
141 |
Enabling Persistent MAC Address |
141 |
Assigning Stack Member Information |
144 |
Assigning a Stack Member Number |
144 |
Setting the Stack Member Priority Value |
144 |
Provisioning a New Member for a Switch Stack |
145 |
Accessing the CLI of a Specific Stack Member |
147 |
Displaying Switch Stack Information |
147 |
Clustering Switches |
149 |
Understanding Switch Clusters |
149 |
Cluster Command Switch Characteristics |
151 |
Standby Cluster Command Switch Characteristics |
151 |
Candidate Switch and Cluster Member Switch Characteristics |
152 |
Planning a Switch Cluster |
152 |
Automatic Discovery of Cluster Candidates and Members |
153 |
Discovery Through CDP Hops |
153 |
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices |
154 |
Discovery Through Different VLANs |
155 |
Discovery Through Different Management VLANs |
155 |
Discovery Through Routed Ports |
156 |
Discovery of Newly Installed Switches |
157 |
HSRP and Standby Cluster Command Switches |
158 |
Virtual IP Addresses |
159 |
Other Considerations for Cluster Standby Groups |
159 |
Automatic Recovery of Cluster Configuration |
160 |
IP Addresses |
161 |
Hostnames |
161 |
Passwords |
162 |
SNMP Community Strings |
162 |
Switch Clusters and Switch Stacks |
163 |
TACACS+ and RADIUS |
164 |
LRE Profiles |
164 |
Using the CLI to Manage Switch Clusters |
164 |
Catalyst1900 and Catalyst2820 CLI Considerations |
165 |
Using SNMP to Manage Switch Clusters |
165 |
Administering the Switch |
167 |
Managing the System Time and Date |
167 |
Understanding the System Clock |
167 |
Understanding Network Time Protocol |
168 |
Configuring NTP |
169 |
Default NTP Configuration |
170 |
Configuring NTP Authentication |
170 |
Configuring NTP Associations |
171 |
Configuring NTP Broadcast Service |
172 |
Configuring NTP Access Restrictions |
174 |
Configuring the Source IP Address for NTP Packets |
176 |
Displaying the NTP Configuration |
177 |
Configuring Time and Date Manually |
177 |
Setting the System Clock |
177 |
Displaying the Time and Date Configuration |
178 |
Configuring the Time Zone |
178 |
Configuring Summer Time (Daylight Saving Time) |
179 |
Configuring a System Name and Prompt |
180 |
Default System Name and Prompt Configuration |
181 |
Configuring a System Name |
181 |
Understanding DNS |
181 |
Default DNS Configuration |
182 |
Setting Up DNS |
182 |
Displaying the DNS Configuration |
183 |
Creating a Banner |
183 |
Default Banner Configuration |
183 |
Configuring a Message-of-the-Day Login Banner |
184 |
Configuring a Login Banner |
185 |
Managing the MAC Address Table |
185 |
Building the Address Table |
186 |
MAC Addresses and VLANs |
186 |
MAC Addresses and Switch Stacks |
187 |
Default MAC Address Table Configuration |
187 |
Changing the Address Aging Time |
187 |
Removing Dynamic Address Entries |
188 |
Configuring MAC Address Notification Traps |
188 |
Adding and Removing Static Address Entries |
190 |
Configuring Unicast MAC Address Filtering |
191 |
Displaying Address Table Entries |
193 |
Managing the ARP Table |
193 |
Configuring SDM Templates |
195 |
Understanding the SDM Templates |
195 |
Dual IPv4 and IPv6 SDM Templates |
196 |
SDM Templates and Switch Stacks |
197 |
Configuring the Switch SDM Template |
198 |
Default SDM Template |
199 |
SDM Template Configuration Guidelines |
199 |
Setting the SDM Template |
200 |
Displaying the SDM Templates |
201 |
Configuring Switch-Based Authentication |
205 |
Preventing Unauthorized Access to Your Switch |
205 |
Protecting Access to Privileged EXEC Commands |
206 |
Default Password and Privilege Level Configuration |
206 |
Setting or Changing a Static Enable Password |
207 |
Protecting Enable and Enable Secret Passwords with Encryption |
207 |
Disabling Password Recovery |
209 |
Setting a Telnet Password for a Terminal Line |
210 |
Configuring Username and Password Pairs |
210 |
Configuring Multiple Privilege Levels |
211 |
Setting the Privilege Level for a Command |
212 |
Changing the Default Privilege Level for Lines |
213 |
Logging into and Exiting a Privilege Level |
213 |
Controlling Switch Access with TACACS+ |
214 |
Understanding TACACS+ |
214 |
TACACS+ Operation |
216 |
Configuring TACACS+ |
216 |
Default TACACS+ Configuration |
217 |
Identifying the TACACS+ Server Host and Setting the Authentication Key |
217 |
Configuring TACACS+ Login Authentication |
218 |
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services |
220 |
Starting TACACS+ Accounting |
221 |
Displaying the TACACS+ Configuration |
221 |
Controlling Switch Access with RADIUS |
221 |
Understanding RADIUS |
222 |
RADIUS Operation |
223 |
Configuring RADIUS |
224 |
Default RADIUS Configuration |
224 |
Identifying the RADIUS Server Host |
224 |
Configuring RADIUS Login Authentication |
227 |
Defining AAA Server Groups |
229 |
Configuring RADIUS Authorization for User Privileged Access and Network Services |
231 |
Starting RADIUS Accounting |
232 |
Configuring Settings for All RADIUS Servers |
233 |
Configuring the Switch to Use Vendor-Specific RADIUS Attributes |
233 |
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication |
235 |
Displaying the RADIUS Configuration |
235 |
Controlling Switch Access with Kerberos |
236 |
Understanding Kerberos |
236 |
Kerberos Operation |
238 |
Authenticating to a Boundary Switch |
238 |
Obtaining a TGT from a KDC |
239 |
Authenticating to Network Services |
239 |
Configuring Kerberos |
239 |
Configuring the Switch for Local Authentication and Authorization |
240 |
Configuring the Switch for Secure Shell |
241 |
Understanding SSH |
242 |
SSH Servers, Integrated Clients, and Supported Versions |
242 |
Limitations |
243 |
Configuring SSH |
243 |
Configuration Guidelines |
243 |
Setting Up the Switch to Run SSH |
244 |
Configuring the SSH Server |
245 |
Displaying the SSH Configuration and Status |
245 |
Configuring the Switch for Secure Socket Layer HTTP |
246 |
Understanding Secure HTTP Servers and Clients |
246 |
Certificate Authority Trustpoints |
246 |
CipherSuites |
248 |
Configuring Secure HTTP Servers and Clients |
248 |
Default SSL Configuration |
248 |
SSL Configuration Guidelines |
249 |
Configuring a CA Trustpoint |
249 |
Configuring the Secure HTTP Server |
250 |
Configuring the Secure HTTP Client |
251 |
Displaying Secure HTTP Server and Client Status |
252 |
Configuring the Switch for Secure Copy Protocol |
252 |
Information About Secure Copy |
253 |
Configuring IEEE 802.1x Port-Based Authentication |
255 |
Understanding IEEE 802.1x Port-Based Authentication |
255 |
Device Roles |
256 |
Authentication Process |
257 |
Authentication Initiation and Message Exchange |
259 |
Ports in Authorized and Unauthorized States |
261 |
IEEE 802.1x Authentication and Switch Stacks |
262 |
IEEE 802.1x Host Mode |
262 |
IEEE 802.1x Accounting |
263 |
IEEE 802.1x Accounting Attribute-Value Pairs |
263 |
Using IEEE 802.1x Authentication with VLAN Assignment |
264 |
Using IEEE 802.1x Authentication with Per-User ACLs |
265 |
Using IEEE 802.1x Authentication with Guest VLAN |
267 |
Using IEEE 802.1x Authentication with Restricted VLAN |
268 |
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass |
269 |
Using IEEE 802.1x Authentication with Voice VLAN Ports |
270 |
Using IEEE 802.1x Authentication with Port Security |
271 |
Using IEEE 802.1x Authentication with Wake-on-LAN |
272 |
Using IEEE 802.1x Authentication with MAC Authentication Bypass |
272 |
Using Network Admission Control Layer 2 IEEE 802.1x Validation |
273 |
Using Multidomain Authentication |
274 |
Using Web Authentication |
275 |
Configuring IEEE 802.1x Authentication |
275 |
Default IEEE 802.1x Authentication Configuration |
276 |
IEEE 802.1x Authentication Configuration Guidelines |
277 |
IEEE 802.1x Authentication |
277 |
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass |
278 |
MAC Authentication Bypass |
279 |
Upgrading from a Previous Software Release |
280 |
Configuring IEEE 802.1x Authentication |
280 |
Configuring the Switch-to-RADIUS-Server Communication |
281 |
Configuring the Host Mode |
283 |
Configuring Periodic Re-Authentication |
284 |
Manually Re-Authenticating a Client Connected to a Port |
284 |
Changing the Quiet Period |
285 |
Changing the Switch-to-Client Retransmission Time |
285 |
Setting the Switch-to-Client Frame-Retransmission Number |
286 |
Setting the Re-Authentication Number |
286 |
Configuring IEEE 802.1x Accounting |
287 |
Configuring a Guest VLAN |
288 |
Configuring a Restricted VLAN |
289 |
Configuring the Inaccessible Authentication Bypass Feature |
291 |
Configuring IEEE 802.1x Authentication with WoL |
293 |
Configuring MAC Authentication Bypass |
294 |
Configuring NAC Layer 2 IEEE 802.1x Validation |
295 |
Configuring Web Authentication |
295 |
Disabling IEEE 802.1x Authentication on the Port |
298 |
Resetting the IEEE 802.1x Authentication Configuration to the Default Values |
299 |
Displaying IEEE 802.1x Statistics and Status |
300 |
Configuring Interface Characteristics |
301 |
Understanding Interface Types |
301 |
Port-Based VLANs |
302 |
Switch Ports |
302 |
Access Ports |
303 |
Trunk Ports |
303 |
Tunnel Ports |
304 |
Routed Ports |
304 |
Switch Virtual Interfaces |
305 |
EtherChannel Port Groups |
306 |
10-Gigabit Ethernet Interfaces |
306 |
Power over Ethernet Ports |
306 |
Supported Protocols and Standards |
307 |
Powered-Device Detection and Initial Power Allocation |
307 |
Power Management Modes |
308 |
Connecting Interfaces |
309 |
Using Interface Configuration Mode |
310 |
Procedures for Configuring Interfaces |
311 |
Configuring a Range of Interfaces |
312 |
Configuring and Using Interface Range Macros |
313 |
Configuring Ethernet Interfaces |
315 |
Default Ethernet Interface Configuration |
315 |
Configuration Guidelines for 10-Gigabit Ethernet Interfaces |
317 |
Configuring Interface Speed and Duplex Mode |
317 |
Speed and Duplex Configuration Guidelines |
317 |
Setting the Interface Speed and Duplex Parameters |
318 |
Configuring IEEE 802.3x Flow Control |
319 |
Configuring Auto-MDIX on an Interface |
320 |
Configuring a Power Management Mode on a PoE Port |
321 |
Budgeting Power for Devices Connected to a PoE Port |
323 |
Adding a Description for an Interface |
324 |
Configuring Layer 3 Interfaces |
325 |
Configuring the System MTU |
327 |
Monitoring and Maintaining the Interfaces |
328 |
Monitoring Interface Status |
329 |
Clearing and Resetting Interfaces and Counters |
330 |
Shutting Down and Restarting the Interface |
330 |
Configuring Smartports Macros |
331 |
Understanding Smartports Macros |
331 |
Configuring Smartports Macros |
332 |
Default Smartports Macro Configuration |
332 |
Smartports Macro Configuration Guidelines |
333 |
Creating Smartports Macros |
334 |
Applying Smartports Macros |
335 |
Applying Cisco-Default Smartports Macros |
336 |
Displaying Smartports Macros |
338 |
Configuring VLANs |
339 |
Understanding VLANs |
339 |
Supported VLANs |
340 |
VLAN Port Membership Modes |
341 |
Configuring Normal-Range VLANs |
342 |
Token Ring VLANs |
344 |
Normal-Range VLAN Configuration Guidelines |
344 |
VLAN Configuration Mode Options |
345 |
VLAN Configuration in config-vlan Mode |
345 |
VLAN Configuration in VLAN Database Configuration Mode |
345 |
Saving VLAN Configuration |
345 |
Default Ethernet VLAN Configuration |
346 |
Creating or Modifying an Ethernet VLAN |
347 |
Deleting a VLAN |
348 |
Assigning Static-Access Ports to a VLAN |
349 |
Configuring Extended-Range VLANs |
350 |
Default VLAN Configuration |
350 |
Extended-Range VLAN Configuration Guidelines |
351 |
Creating an Extended-Range VLAN |
352 |
Creating an Extended-Range VLAN with an Internal VLAN ID |
353 |
Displaying VLANs |
354 |
Configuring VLAN Trunks |
354 |
Trunking Overview |
354 |
Encapsulation Types |
356 |
IEEE 802.1Q Configuration Considerations |
357 |
Default Layer 2 Ethernet Interface VLAN Configuration |
357 |
Configuring an Ethernet Interface as a Trunk Port |
357 |
Interaction with Other Features |
358 |
Configuring a Trunk Port |
358 |
Defining the Allowed VLANs on a Trunk |
359 |
Changing the Pruning-Eligible List |
360 |
Configuring the Native VLAN for Untagged Traffic |
361 |
Configuring Trunk Ports for Load Sharing |
362 |
Load Sharing Using STP Port Priorities |
362 |
Load Sharing Using STP Path Cost |
364 |
Configuring VMPS |
366 |
Understanding VMPS |
366 |
Dynamic-Access Port VLAN Membership |
367 |
Default VMPS Client Configuration |
367 |
VMPS Configuration Guidelines |
367 |
Configuring the VMPS Client |
368 |
Entering the IP Address of the VMPS |
368 |
Configuring Dynamic-Access Ports on VMPS Clients |
369 |
Reconfirming VLAN Memberships |
369 |
Changing the Reconfirmation Interval |
369 |
Changing the Retry Count |
370 |
Monitoring the VMPS |
370 |
Troubleshooting Dynamic-Access Port VLAN Membership |
371 |
VMPS Configuration Example |
371 |
Configuring VTP |
373 |
Understanding VTP |
373 |
The VTP Domain |
374 |
VTP Modes |
375 |
VTP Advertisements |
375 |
VTP Version 2 |
376 |
VTP Pruning |
376 |
VTP and Switch Stacks |
378 |
Configuring VTP |
378 |
Default VTP Configuration |
379 |
VTP Configuration Options |
379 |
VTP Configuration in Global Configuration Mode |
379 |
VTP Configuration in VLAN Database Configuration Mode |
380 |
VTP Configuration Guidelines |
380 |
Domain Names |
380 |
Passwords |
380 |
VTP Version |
381 |
Configuration Requirements |
381 |
Configuring a VTP Server |
381 |
Configuring a VTP Client |
383 |
Disabling VTP (VTP Transparent Mode) |
384 |
Enabling VTP Version 2 |
385 |
Enabling VTP Pruning |
386 |
Adding a VTP Client Switch to a VTP Domain |
386 |
Monitoring VTP |
388 |
Configuring Voice VLAN |
389 |
Understanding Voice VLAN |
389 |
Cisco IP Phone Voice Traffic |
390 |
Cisco IP Phone Data Traffic |
390 |
Configuring Voice VLAN |
391 |
Default Voice VLAN Configuration |
391 |
Voice VLAN Configuration Guidelines |
391 |
Configuring a Port Connected to a Cisco7960 IP Phone |
392 |
Configuring Cisco IP Phone Voice Traffic |
393 |
Configuring the Priority of Incoming Data Frames |
394 |
Displaying Voice VLAN |
394 |
Configuring Private VLANs |
395 |
Understanding Private VLANs |
395 |
IP Addressing Scheme with Private VLANs |
397 |
Private VLANs across Multiple Switches |
398 |
Private-VLAN Interaction with Other Features |
398 |
Private VLANs and Unicast, Broadcast, and Multicast Traffic |
399 |
Private VLANs and SVIs |
399 |
Private VLANs and Switch Stacks |
400 |
Configuring Private VLANs |
400 |
Tasks for Configuring Private VLANs |
400 |
Default Private-VLAN Configuration |
401 |
Private-VLAN Configuration Guidelines |
401 |
Secondary and Primary VLAN Configuration |
401 |
Private-VLAN Port Configuration |
402 |
Limitations with Other Features |
403 |
Configuring and Associating VLANs in a Private VLAN |
404 |
Configuring a Layer 2 Interface as a Private-VLAN Host Port |
406 |
Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port |
407 |
Mapping Secondary VLANs to a Primary VLAN Layer 3 VLAN Interface |
408 |
Monitoring Private VLANs |
409 |
Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling |
411 |
Understanding IEEE 802.1Q Tunneling |
411 |
Configuring IEEE 802.1Q Tunneling |
414 |
Default IEEE 802.1Q Tunneling Configuration |
414 |
IEEE 802.1Q Tunneling Configuration Guidelines |
414 |
Native VLANs |
414 |
System MTU |
415 |
IEEE 802.1Q Tunneling and Other Features |
416 |
Configuring an IEEE 802.1Q Tunneling Port |
416 |
Understanding Layer 2 Protocol Tunneling |
417 |
Configuring Layer 2 Protocol Tunneling |
420 |
Default Layer 2 Protocol Tunneling Configuration |
421 |
Layer 2 Protocol Tunneling Configuration Guidelines |
422 |
Configuring Layer 2 Protocol Tunneling |
423 |
Configuring Layer 2 Tunneling for EtherChannels |
424 |
Configuring the SP Edge Switch |
424 |
Configuring the Customer Switch |
426 |
Monitoring and Maintaining Tunneling Status |
428 |
Configuring STP |
429 |
Understanding Spanning-Tree Features |
429 |
STP Overview |
430 |
Spanning-Tree Topology and BPDUs |
431 |
Bridge ID, Switch Priority, and Extended System ID |
432 |
Spanning-Tree Interface States |
433 |
Blocking State |
435 |
Listening State |
435 |
Learning State |
435 |
Forwarding State |
435 |
Disabled State |
436 |
How a Switch or Port Becomes the Root Switch or Root Port |
436 |
Spanning Tree and Redundant Connectivity |
437 |
Spanning-Tree Address Management |
437 |
Accelerated Aging to Retain Connectivity |
437 |
Spanning-Tree Modes and Protocols |
438 |
Supported Spanning-Tree Instances |
438 |
Spanning-Tree Interoperability and Backward Compatibility |
439 |
STP and IEEE 802.1Q Trunks |
439 |
VLAN-Bridge Spanning Tree |
439 |
Spanning Tree and Switch Stacks |
440 |
Configuring Spanning-Tree Features |
440 |
Default Spanning-Tree Configuration |
441 |
Spanning-Tree Configuration Guidelines |
441 |
Changing the Spanning-Tree Mode. |
443 |
Disabling Spanning Tree |
444 |
Configuring the Root Switch |
444 |
Configuring a Secondary Root Switch |
446 |
Configuring Port Priority |
446 |
Configuring Path Cost |
448 |
Configuring the Switch Priority of a VLAN |
449 |
Configuring Spanning-Tree Timers |
450 |
Configuring the Hello Time |
450 |
Configuring the Forwarding-Delay Time for a VLAN |
451 |
Configuring the Maximum-Aging Time for a VLAN |
451 |
Configuring the Transmit Hold-Count |
452 |
Displaying the Spanning-Tree Status |
452 |
Configuring MSTP |
453 |
Understanding MSTP |
454 |
Multiple Spanning-Tree Regions |
454 |
IST, CIST, and CST |
455 |
Operations Within an MST Region |
455 |
Operations Between MST Regions |
456 |
IEEE 802.1s Terminology |
457 |
Hop Count |
457 |
Boundary Ports |
458 |
IEEE 802.1s Implementation |
458 |
Port Role Naming Change |
459 |
Interoperation Between Legacy and Standard Switches |
459 |
Detecting Unidirectional Link Failure |
460 |
MSTP and Switch Stacks |
460 |
Interoperability with IEEE 802.1D STP |
461 |
Understanding RSTP |
461 |
Port Roles and the Active Topology |
461 |
Rapid Convergence |
462 |
Synchronization of Port Roles |
463 |
Bridge Protocol Data Unit Format and Processing |
464 |
Processing Superior BPDU Information |
465 |
Processing Inferior BPDU Information |
465 |
Topology Changes |
465 |
Configuring MSTP Features |
466 |
Default MSTP Configuration |
467 |
MSTP Configuration Guidelines |
467 |
Specifying the MST Region Configuration and Enabling MSTP |
468 |
Configuring the Root Switch |
469 |
Configuring a Secondary Root Switch |
471 |
Configuring Port Priority |
471 |
Configuring Path Cost |
473 |
Configuring the Switch Priority |
474 |
Configuring the Hello Time |
474 |
Configuring the Forwarding-Delay Time |
475 |
Configuring the Maximum-Aging Time |
476 |
Configuring the Maximum-Hop Count |
476 |
Specifying the Link Type to Ensure Rapid Transitions |
476 |
Designating the Neighbor Type |
477 |
Restarting the Protocol Migration Process |
478 |
Displaying the MST Configuration and Status |
478 |
Configuring Optional Spanning-Tree Features |
479 |
Understanding Optional Spanning-Tree Features |
479 |
Understanding Port Fast |
480 |
Understanding BPDU Guard |
480 |
Understanding BPDU Filtering |
481 |
Understanding UplinkFast |
481 |
Understanding Cross-Stack UplinkFast |
483 |
How CSUF Works |
484 |
Events that Cause Fast Convergence |
485 |
Understanding BackboneFast |
485 |
Understanding EtherChannel Guard |
488 |
Understanding Root Guard |
488 |
Understanding Loop Guard |
489 |
Configuring Optional Spanning-Tree Features |
489 |
Default Optional Spanning-Tree Configuration |
490 |
Optional Spanning-Tree Configuration Guidelines |
490 |
Enabling Port Fast |
490 |
Enabling BPDU Guard |
491 |
Enabling BPDU Filtering |
492 |
Enabling UplinkFast for Use with Redundant Links |
493 |
Enabling Cross-Stack UplinkFast |
494 |
Enabling BackboneFast |
494 |
Enabling EtherChannel Guard |
495 |
Enabling Root Guard |
495 |
Enabling Loop Guard |
496 |
Displaying the Spanning-Tree Status |
497 |
Configuring Flex Links and the MAC Address-Table Move Update Feature |
499 |
Understanding Flex Links and the MAC Address-Table MoveUpdate |
499 |
Flex Links |
499 |
MAC Address-Table Move Update |
500 |
Configuring Flex Links and MAC Address-Table Move Update |
502 |
Configuration Guidelines |
502 |
Default Configuration |
502 |
Configuring Flex Links and MAC Address-Table Move Update |
503 |
Configuring Flex Links |
503 |
Configuring the MAC Address-Table Move Update Feature |
504 |
Monitoring Flex Links and the MAC Address-Table MoveUpdate |
507 |
Configuring DHCP Features and IP Source Guard |
509 |
Understanding DHCP Features |
509 |
DHCP Server |
510 |
DHCP Relay Agent |
510 |
DHCP Snooping |
510 |
Option-82 Data Insertion |
511 |
Cisco IOS DHCP Server Database |
514 |
DHCP Snooping Binding Database |
515 |
DHCP Snooping and Switch Stacks |
516 |
Configuring DHCP Features |
516 |
Default DHCP Configuration |
516 |
DHCP Snooping Configuration Guidelines |
517 |
Configuring the DHCP Server |
518 |
DHCP Server and Switch Stacks |
518 |
Configuring the DHCP Relay Agent |
519 |
Specifying the Packet Forwarding Address |
519 |
Enabling DHCP Snooping and Option 82 |
520 |
Enabling DHCP Snooping on Private VLANs |
522 |
Enabling the Cisco IOS DHCP Server Database |
522 |
Enabling the DHCP Snooping Binding Database Agent |
523 |
Displaying DHCP Snooping Information |
524 |
Understanding IP Source Guard |
524 |
Source IP Address Filtering |
524 |
Source IP and MAC Address Filtering |
525 |
Configuring IP Source Guard |
525 |
Default IP Source Guard Configuration |
525 |
IP Source Guard Configuration Guidelines |
525 |
Enabling IP Source Guard |
526 |
Displaying IP Source Guard Information |
527 |
Configuring Dynamic ARP Inspection |
529 |
Understanding Dynamic ARP Inspection |
529 |
Interface Trust States and Network Security |
531 |
Rate Limiting of ARP Packets |
532 |
Relative Priority of ARP ACLs and DHCP Snooping Entries |
532 |
Logging of Dropped Packets |
533 |
Configuring Dynamic ARP Inspection |
533 |
Default Dynamic ARP Inspection Configuration |
533 |
Dynamic ARP Inspection Configuration Guidelines |
534 |
Configuring Dynamic ARP Inspection in DHCP Environments |
535 |
Configuring ARP ACLs for Non-DHCP Environments |
536 |
Limiting the Rate of Incoming ARP Packets |
538 |
Performing Validation Checks |
539 |
Configuring the Log Buffer |
540 |
Displaying Dynamic ARP Inspection Information |
542 |
Configuring IGMP Snooping and MVR |
545 |
Understanding IGMP Snooping |
546 |
IGMP Versions |
547 |
Joining a Multicast Group |
547 |
Leaving a Multicast Group |
549 |
Immediate Leave |
550 |
IGMP Configurable-Leave Timer |
550 |
IGMP Report Suppression |
550 |
IGMP Snooping and Switch Stacks |
551 |
Configuring IGMP Snooping |
551 |
Default IGMP Snooping Configuration |
551 |
Enabling or Disabling IGMP Snooping |
552 |
Setting the Snooping Method |
553 |
Configuring a Multicast Router Port |
554 |
Configuring a Host Statically to Join a Group |
555 |
Enabling IGMP Immediate Leave |
555 |
Configuring the IGMP Leave Timer |
556 |
Configuring TCN-Related Commands |
557 |
Controlling the Multicast Flooding Time After a TCN Event |
557 |
Recovering from Flood Mode |
557 |
Disabling Multicast Flooding During a TCN Event |
558 |
Configuring the IGMP Snooping Querier |
559 |
Disabling IGMP Report Suppression |
560 |
Displaying IGMP Snooping Information |
560 |
Understanding Multicast VLAN Registration |
562 |
Using MVR in a Multicast Television Application |
563 |
Configuring MVR |
564 |
Default MVR Configuration |
564 |
MVR Configuration Guidelines and Limitations |
565 |
Configuring MVR Global Parameters |
565 |
Configuring MVR Interfaces |
566 |
Displaying MVR Information |
568 |
Configuring IGMP Filtering and Throttling |
568 |
Default IGMP Filtering and Throttling Configuration |
569 |
Configuring IGMP Profiles |
569 |
Applying IGMP Profiles |
570 |
Setting the Maximum Number of IGMP Groups |
571 |
Configuring the IGMP Throttling Action |
572 |
Displaying IGMP Filtering and Throttling Configuration |
573 |
Configuring Port-Based Traffic Control |
575 |
Configuring Storm Control |
575 |
Understanding Storm Control |
575 |
Default Storm Control Configuration |
577 |
Configuring Storm Control and Threshold Levels |
577 |
Configuring Protected Ports |
579 |
Default Protected Port Configuration |
580 |
Protected Port Configuration Guidelines |
580 |
Configuring a Protected Port |
580 |
Configuring Port Blocking |
581 |
Default Port Blocking Configuration |
581 |
Blocking Flooded Traffic on an Interface |
581 |
Configuring Port Security |
582 |
Understanding Port Security |
582 |
Secure MAC Addresses |
582 |
Security Violations |
583 |
Default Port Security Configuration |
584 |
Port Security Configuration Guidelines |
584 |
Enabling and Configuring Port Security |
586 |
Enabling and Configuring Port Security Aging |
589 |
Port Security and Switch Stacks |
591 |
Displaying Port-Based Traffic Control Settings |
591 |
Configuring CDP |
593 |
Understanding CDP |
593 |
CDP and Switch Stacks |
594 |
Configuring CDP |
594 |
Default CDP Configuration |
594 |
Configuring the CDP Characteristics |
594 |
Disabling and Enabling CDP |
595 |
Disabling and Enabling CDP on an Interface |
596 |
Monitoring and Maintaining CDP |
597 |
Configuring UDLD |
599 |
Understanding UDLD |
599 |
Modes of Operation |
599 |
Methods to Detect Unidirectional Links |
600 |
Configuring UDLD |
602 |
Default UDLD Configuration |
602 |
Configuration Guidelines |
602 |
Enabling UDLD Globally |
603 |
Enabling UDLD on an Interface |
604 |
Resetting an Interface Disabled by UDLD |
604 |
Displaying UDLD Status |
605 |
Configuring SPAN and RSPAN |
607 |
Understanding SPAN and RSPAN |
607 |
Local SPAN |
608 |
Remote SPAN |
609 |
SPAN and RSPAN Concepts and Terminology |
610 |
SPAN Sessions |
610 |
Monitored Traffic |
611 |
Source Ports |
612 |
Source VLANs |
613 |
VLAN Filtering |
613 |
Destination Port |
614 |
RSPAN VLAN |
615 |
SPAN and RSPAN Interaction with Other Features |
615 |
SPAN and RSPAN and Switch Stacks |
616 |
Configuring SPAN and RSPAN |
616 |
Default SPAN and RSPAN Configuration |
617 |
Configuring Local SPAN |
617 |
SPAN Configuration Guidelines |
617 |
Creating a Local SPAN Session |
618 |
Creating a Local SPAN Session and Configuring Incoming Traffic |
621 |
Specifying VLANs to Filter |
622 |
Configuring RSPAN |
623 |
RSPAN Configuration Guidelines |
624 |
Configuring a VLAN as an RSPAN VLAN |
625 |
Creating an RSPAN Source Session |
625 |
Creating an RSPAN Destination Session |
627 |
Creating an RSPAN Destination Session and Configuring Incoming Traffic |
628 |
Specifying VLANs to Filter |
630 |
Displaying SPAN and RSPAN Status |
631 |
Configuring RMON |
633 |
Understanding RMON |
633 |
Configuring RMON |
634 |
Default RMON Configuration |
635 |
Configuring RMON Alarms and Events |
635 |
Collecting Group History Statistics on an Interface |
637 |
Collecting Group Ethernet Statistics on an Interface |
637 |
Displaying RMON Status |
638 |
Configuring System Message Logging |
639 |
Understanding System Message Logging |
639 |
Configuring System Message Logging |
640 |
System Log Message Format |
640 |
Default System Message Logging Configuration |
642 |
Disabling Message Logging |
642 |
Setting the Message Display Destination Device |
643 |
Synchronizing Log Messages |
644 |
Enabling and Disabling Time Stamps on Log Messages |
646 |
Enabling and Disabling Sequence Numbers in Log Messages |
646 |
Defining the Message Severity Level |
647 |
Limiting Syslog Messages Sent to the History Table and to SNMP |
648 |
Enabling the Configuration-Change Logger |
649 |
Configuring UNIX Syslog Servers |
650 |
Logging Messages to a UNIX Syslog Daemon |
650 |
Configuring the UNIX System Logging Facility |
651 |
Displaying the Logging Configuration |
652 |
Configuring SNMP |
653 |
Understanding SNMP |
653 |
SNMP Versions |
654 |
SNMP Manager Functions |
655 |
SNMP Agent Functions |
656 |
SNMP Community Strings |
656 |
Using SNMP to Access MIB Variables |
656 |
SNMP Notifications |
657 |
SNMP ifIndex MIB Object Values |
658 |
Configuring SNMP |
658 |
Default SNMP Configuration |
659 |
SNMP Configuration Guidelines |
659 |
Disabling the SNMP Agent |
660 |
Configuring Community Strings |
660 |
Configuring SNMP Groups and Users |
662 |
Configuring SNMP Notifications |
664 |
Setting the Agent Contact and Location Information |
667 |
Limiting TFTP Servers Used Through SNMP |
668 |
SNMP Examples |
668 |
Displaying SNMP Status |
669 |
Configuring Network Security with ACLs |
671 |
Understanding ACLs |
671 |
Supported ACLs |
672 |
Port ACLs |
673 |
Router ACLs |
674 |
VLAN Maps |
675 |
Handling Fragmented and Unfragmented Traffic |
675 |
ACLs and Switch Stacks |
676 |
Configuring IPv4 ACLs |
677 |
Creating Standard and Extended IPv4 ACLs |
677 |
Access List Numbers |
678 |
ACL Logging |
679 |
Creating a Numbered Standard ACL |
680 |
Creating a Numbered Extended ACL |
681 |
Resequencing ACEs in an ACL |
685 |
Creating Named Standard and Extended ACLs |
685 |
Using Time Ranges with ACLs |
687 |
Including Comments in ACLs |
689 |
Applying an IPv4 ACL to a Terminal Line |
689 |
Applying an IPv4 ACL to an Interface |
690 |
Hardware and Software Treatment of IP ACLs |
692 |
IPv4 ACL Configuration Examples |
692 |
Numbered ACLs |
694 |
Extended ACLs |
694 |
Named ACLs |
694 |
Time Range Applied to an IP ACL |
695 |
Commented IP ACL Entries |
695 |
ACL Logging |
696 |
Creating Named MAC Extended ACLs |
697 |
Applying a MAC ACL to a Layer 2 Interface |
698 |
Configuring VLAN Maps |
699 |
VLAN Map Configuration Guidelines |
700 |
Creating a VLAN Map |
701 |
Examples of ACLs and VLAN Maps |
702 |
Applying a VLAN Map to a VLAN |
704 |
Using VLAN Maps in Your Network |
704 |
Wiring Closet Configuration |
704 |
Denying Access to a Server on Another VLAN |
705 |
Using VLAN Maps with Router ACLs |
706 |
VLAN Maps and Router ACL Configuration Guidelines |
707 |
Examples of Router ACLs and VLAN Maps Applied to VLANs |
708 |
ACLs and Switched Packets |
708 |
ACLs and Bridged Packets |
708 |
ACLs and Routed Packets |
709 |
ACLs and Multicast Packets |
710 |
Displaying IPv4 ACL Configuration |
710 |
Configuring QoS |
713 |
Understanding QoS |
714 |
Basic QoS Model |
715 |
Classification |
717 |
Classification Based on QoS ACLs |
719 |
Classification Based on Class Maps and Policy Maps |
719 |
Policing and Marking |
720 |
Policing on Physical Ports |
721 |
Policing on SVIs |
722 |
Mapping Tables |
724 |
Queueing and Scheduling Overview |
725 |
Weighted Tail Drop |
725 |
SRR Shaping and Sharing |
726 |
Queueing and Scheduling on Ingress Queues |
727 |
Queueing and Scheduling on Egress Queues |
729 |
Packet Modification |
731 |
Configuring Auto-QoS |
732 |
Generated Auto-QoS Configuration |
732 |
Effects of Auto-QoS on the Configuration |
737 |
Auto-QoS Configuration Guidelines |
737 |
Upgrading from a Previous Software Release |
738 |
Enabling Auto-QoS for VoIP |
738 |
Auto-QoS Configuration Example |
740 |
Displaying Auto-QoS Information |
742 |
Configuring Standard QoS |
742 |
Default Standard QoS Configuration |
743 |
Default Ingress Queue Configuration |
743 |
Default Egress Queue Configuration |
744 |
Default Mapping Table Configuration |
745 |
Standard QoS Configuration Guidelines |
745 |
QoS ACL Guidelines |
745 |
Applying QoS on Interfaces |
745 |
Policing Guidelines |
746 |
General QoS Guidelines |
747 |
Enabling QoS Globally |
747 |
Enabling VLAN-Based QoS on Physical Ports |
747 |
Configuring Classification Using Port Trust States |
748 |
Configuring the Trust State on Ports within the QoS Domain |
748 |
Configuring the CoS Value for an Interface |
750 |
Configuring a Trusted Boundary to Ensure Port Security |
751 |
Enabling DSCP Transparency Mode |
752 |
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain |
753 |
Configuring a QoS Policy |
755 |
Classifying Traffic by Using ACLs |
756 |
Classifying Traffic by Using Class Maps |
759 |
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps |
761 |
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps |
765 |
Classifying, Policing, and Marking Traffic by Using Aggregate Policers |
771 |
Configuring DSCP Maps |
773 |
Configuring the CoS-to-DSCP Map |
773 |
Configuring the IP-Precedence-to-DSCP Map |
774 |
Configuring the Policed-DSCP Map |
775 |
Configuring the DSCP-to-CoS Map |
776 |
Configuring the DSCP-to-DSCP-Mutation Map |
777 |
Configuring Ingress Queue Characteristics |
779 |
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds |
780 |
Allocating Buffer Space Between the Ingress Queues |
781 |
Allocating Bandwidth Between the Ingress Queues |
781 |
Configuring the Ingress Priority Queue |
782 |
Configuring Egress Queue Characteristics |
783 |
Configuration Guidelines |
784 |
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set |
784 |
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID |
786 |
Configuring SRR Shaped Weights on Egress Queues |
788 |
Configuring SRR Shared Weights on Egress Queues |
789 |
Configuring the Egress Expedite Queue |
790 |
Limiting the Bandwidth on an Egress Interface |
790 |
Displaying Standard QoS Information |
791 |
Configuring EtherChannels and Link-State Tracking |
793 |
Understanding EtherChannels |
793 |
EtherChannel Overview |
794 |
Port-Channel Interfaces |
796 |
Port Aggregation Protocol |
797 |
PAgP Modes |
798 |
PAgP Interaction with Other Features |
798 |
Link Aggregation Control Protocol |
799 |
LACP Modes |
799 |
LACP Interaction with Other Features |
799 |
EtherChannel On Mode |
800 |
Load Balancing and Forwarding Methods |
800 |
EtherChannel and Switch Stacks |
802 |
Configuring EtherChannels |
803 |
Default EtherChannel Configuration |
803 |
EtherChannel Configuration Guidelines |
804 |
Configuring Layer2 EtherChannels |
805 |
Configuring Layer3 EtherChannels |
807 |
Creating Port-Channel Logical Interfaces |
807 |
Configuring the Physical Interfaces |
808 |
Configuring EtherChannel Load Balancing |
810 |
Configuring the PAgP Learn Method and Priority |
811 |
Configuring LACP Hot-Standby Ports |
812 |
Configuring the LACP System Priority |
813 |
Configuring the LACP Port Priority |
814 |
Displaying EtherChannel, PAgP, and LACP Status |
815 |
Understanding Link-State Tracking |
815 |
Configuring Link-State Tracking |
817 |
Default Link-State Tracking Configuration |
818 |
Link-State Tracking Configuration Guidelines |
818 |
Configuring Link-State Tracking |
818 |
Displaying Link-State Tracking Status |
819 |
Configuring IP Unicast Routing |
821 |
Understanding IP Routing |
822 |
Types of Routing |
822 |
IP Routing and Switch Stacks |
823 |
Steps for Configuring Routing |
825 |
Configuring IP Addressing |
825 |
Default Addressing Configuration |
826 |
Assigning IP Addresses to Network Interfaces |
827 |
Use of Subnet Zero |
827 |
Classless Routing |
828 |
Configuring Address Resolution Methods |
829 |
Define a Static ARP Cache |
830 |
Set ARP Encapsulation |
831 |
Enable Proxy ARP |
831 |
Routing Assistance When IP Routing is Disabled |
832 |
Proxy ARP |
832 |
Default Gateway |
832 |
ICMP Router Discovery Protocol (IRDP) |
832 |
Configuring Broadcast Packet Handling |
834 |
Enabling Directed Broadcast-to-Physical Broadcast Translation |
834 |
Forwarding UDP Broadcast Packets and Protocols |
835 |
Establishing an IP Broadcast Address |
836 |
Flooding IP Broadcasts |
837 |
Monitoring and Maintaining IP Addressing |
838 |
Enabling IP Unicast Routing |
839 |
Configuring RIP |
839 |
Default RIP Configuration |
840 |
Configuring Basic RIP Parameters |
841 |
Configuring RIP Authentication |
842 |
Configuring Summary Addresses and Split Horizon |
843 |
Configuring Split Horizon |
844 |
Configuring OSPF |
845 |
Default OSPF Configuration |
846 |
OSPF Nonstop Forwarding |
847 |
Configuring Basic OSPF Parameters |
848 |
Configuring OSPF Interfaces |
849 |
Configuring OSPF Area Parameters |
850 |
Configuring Other OSPF Parameters |
851 |
Changing LSA Group Pacing |
853 |
Configuring a Loopback Interface |
853 |
Monitoring OSPF |
854 |
Configuring EIGRP |
855 |
Default EIGRP Configuration |
856 |
EIGRP Nonstop Forwarding |
858 |
Configuring Basic EIGRP Parameters |
859 |
Configuring EIGRP Interfaces |
860 |
Configuring EIGRP Route Authentication |
860 |
EIGRP Stub Routing |
861 |
Monitoring and Maintaining EIGRP |
862 |
Configuring BGP |
863 |
Default BGP Configuration |
865 |
Nonstop Forwarding Awareness |
867 |
Enabling BGP Routing |
867 |
Managing Routing Policy Changes |
870 |
Configuring BGP Decision Attributes |
871 |
Configuring BGP Filtering with Route Maps |
873 |
Configuring BGP Filtering by Neighbor |
874 |
Configuring Prefix Lists for BGP Filtering |
875 |
Configuring BGP Community Filtering |
876 |
Configuring BGP Neighbors and Peer Groups |
877 |
Configuring Aggregate Addresses |
879 |
Configuring Routing Domain Confederations |
880 |
Configuring BGP Route Reflectors |
881 |
Configuring Route Dampening |
882 |
Monitoring and Maintaining BGP |
883 |
Configuring Multi-VRF CE |
884 |
Understanding Multi-VRF CE |
885 |
Default Multi-VRF CE Configuration |
887 |
Multi-VRF CE Configuration Guidelines |
887 |
Configuring VRFs |
888 |
Configuring a VPN Routing Session |
889 |
Configuring BGP PE to CE Routing Sessions |
889 |
Multi-VRF CE Configuration Example |
890 |
Displaying Multi-VRF CE Status |
894 |
Configuring Protocol-Independent Features |
895 |
Configuring Distributed Cisco Express Forwarding |
895 |
Configuring the Number of Equal-Cost Routing Paths |
896 |
Configuring Static Unicast Routes |
897 |
Specifying Default Routes and Networks |
898 |
Using Route Maps to Redistribute Routing Information |
899 |
Configuring Policy-Based Routing |
902 |
PBR Configuration Guidelines |
903 |
Enabling PBR |
904 |
Filtering Routing Information |
906 |
Setting Passive Interfaces |
906 |
Controlling Advertising and Processing in Routing Updates |
907 |
Filtering Sources of Routing Information |
907 |
Managing Authentication Keys |
908 |
Monitoring and Maintaining the IP Network |
909 |
Configuring IPv6 Unicast Routing |
911 |
Understanding IPv6 |
911 |
IPv6 Addresses |
912 |
Supported IPv6 Unicast Routing Features |
913 |
128-Bit Wide Unicast Addresses |
913 |
DNS for IPv6 |
914 |
Path MTU Discovery for IPv6 Unicast |
914 |
ICMPv6 |
914 |
Neighbor Discovery |
914 |
IPv6 Stateless Autoconfiguration and Duplicate Address Detection |
915 |
IPv6 Applications |
915 |
Dual IPv4 and IPv6 Protocol Stacks |
916 |
Unsupported IPv6 Unicast Routing Features |
916 |
Limitations |
917 |
IPv6 and Switch Stacks |
917 |
SDM Templates |
918 |
Dual IPv4-and IPv6 SDM Templates |
919 |
Configuring IPv6 |
920 |
Default IPv6 Configuration |
921 |
Configuring IPv6 Addressing and Enabling IPv6 Routing |
921 |
Configuring IPv4 and IPv6 Protocol Stacks |
923 |
Configuring IPv6 ICMP Rate Limiting |
925 |
Configuring CEF and dCEF for IPv6 |
925 |
Configuring Static Routing for IPv6 |
926 |
Configuring RIP for IPv6 |
928 |
Configuring OSPF for IPv6 |
930 |
Displaying IPv6 |
932 |
Configuring IPv6 MLD Snooping |
937 |
Understanding MLD Snooping |
937 |
MLD Messages |
938 |
MLD Queries |
939 |
Multicast Client Aging Robustness |
939 |
Multicast Router Discovery |
939 |
MLD Reports |
940 |
MLD Done Messages and Immediate-Leave |
940 |
Topology Change Notification Processing |
941 |
MLD Snooping in Switch Stacks |
941 |
Configuring IPv6 MLD Snooping |
941 |
Default MLD Snooping Configuration |
941 |
MLD Snooping Configuration Guidelines |
942 |
Enabling or Disabling MLD Snooping |
942 |
Configuring a Static Multicast Group |
944 |
Configuring a Multicast Router Port |
944 |
Enabling MLD Immediate Leave |
945 |
Configuring MLD Snooping Queries |
946 |
Disabling MLD Listener Message Suppression |
947 |
Displaying MLD Snooping Information |
947 |
Configuring IPv6 ACLs |
949 |
Understanding IPv6 ACLs |
949 |
Supported ACL Features |
950 |
IPv6 ACL Limitations |
951 |
IPv6 ACLs and Switch Stacks |
951 |
Configuring IPv6 ACLs |
952 |
Default IPv6 ACL Configuration |
952 |
Interaction with Other Features |
952 |
Creating IPv6 ACLs |
953 |
Applying an IPv6 ACL to an Interface |
955 |
Displaying IPv6 ACLs |
956 |
Configuring HSRP and Enhanced Object Tracking |
957 |
Understanding HSRP |
957 |
Multiple HSRP |
959 |
HSRP and Switch Stacks |
960 |
Configuring HSRP |
960 |
Default HSRP Configuration |
961 |
HSRP Configuration Guidelines |
961 |
Enabling HSRP |
961 |
Configuring HSRP Priority |
962 |
Configuring MHSRP |
965 |
Configuring HSRP Authentication and Timers |
965 |
Enabling HSRP Support for ICMP Redirect Messages |
967 |
Configuring HSRP Groups and Clustering |
967 |
Displaying HSRP Configurations |
967 |
Configuring Enhanced Object Tracking |
968 |
Understanding Enhanced Object Tracking |
968 |
Configuring Enhanced Object Tracking Features |
969 |
Tracking Interface Line-Protocol or IP Routing State |
969 |
Configuring a Tracked List |
970 |
Configuring HSRP Object Tracking |
973 |
Configuring Other Tracking Characteristics |
974 |
Configuring IP Multicast Routing |
975 |
Understanding Cisco’s Implementation of IP Multicast Routing |
976 |
Understanding IGMP |
977 |
IGMP Version 1 |
977 |
IGMP Version 2 |
977 |
Understanding PIM |
978 |
PIM Versions |
978 |
PIM Modes |
978 |
Auto-RP |
979 |
Bootstrap Router |
979 |
Multicast Forwarding and Reverse Path Check |
980 |
Understanding DVMRP |
981 |
Understanding CGMP |
982 |
Multicast Routing and Switch Stacks |
982 |
Configuring IP Multicast Routing |
983 |
Default Multicast Routing Configuration |
983 |
Multicast Routing Configuration Guidelines |
983 |
PIMv1 and PIMv2 Interoperability |
984 |
Auto-RP and BSR Configuration Guidelines |
984 |
Configuring Basic Multicast Routing |
985 |
Configuring a Rendezvous Point |
986 |
Manually Assigning an RP to Multicast Groups |
987 |
Configuring Auto-RP |
988 |
Configuring PIMv2 BSR |
993 |
Using Auto-RP and a BSR |
997 |
Monitoring the RP Mapping Information |
998 |
Troubleshooting PIMv1 and PIMv2 Interoperability Problems |
998 |
Configuring Advanced PIM Features |
998 |
Understanding PIM Shared Tree and Source Tree |
998 |
Delaying the Use of PIM Shortest-Path Tree |
1000 |
Modifying the PIM Router-Query Message Interval |
1001 |
Configuring Optional IGMP Features |
1002 |
Default IGMP Configuration |
1002 |
Configuring the Switch as a Member of a Group |
1002 |
Controlling Access to IP Multicast Groups |
1003 |
Changing the IGMP Version |
1004 |
Modifying the IGMP Host-Query Message Interval |
1005 |
Changing the IGMP Query Timeout for IGMPv2 |
1005 |
Changing the Maximum Query Response Time for IGMPv2 |
1006 |
Configuring the Switch as a Statically Connected Member |
1007 |
Configuring Optional Multicast Routing Features |
1007 |
Enabling CGMP Server Support |
1008 |
Configuring sdr Listener Support |
1009 |
Enabling sdr Listener Support |
1009 |
Limiting How Long an sdr Cache Entry Exists |
1009 |
Configuring an IP Multicast Boundary |
1010 |
Configuring Basic DVMRP Interoperability Features |
1012 |
Configuring DVMRP Interoperability |
1012 |
Configuring a DVMRP Tunnel |
1014 |
Advertising Network 0.0.0.0 to DVMRP Neighbors |
1016 |
Responding to mrinfo Requests |
1017 |
Configuring Advanced DVMRP Interoperability Features |
1017 |
Enabling DVMRP Unicast Routing |
1017 |
Rejecting a DVMRP Nonpruning Neighbor |
1018 |
Controlling Route Exchanges |
1021 |
Limiting the Number of DVMRP Routes Advertised |
1021 |
Changing the DVMRP Route Threshold |
1021 |
Configuring a DVMRP Summary Address |
1022 |
Disabling DVMRP Autosummarization |
1024 |
Adding a Metric Offset to the DVMRP Route |
1024 |
Monitoring and Maintaining IP Multicast Routing |
1025 |
Clearing Caches, Tables, and Databases |
1025 |
Displaying System and Network Statistics |
1026 |
Monitoring IP Multicast Routing |
1027 |
Configuring MSDP |
1029 |
Understanding MSDP |
1029 |
MSDP Operation |
1030 |
MSDP Benefits |
1031 |
Configuring MSDP |
1032 |
Default MSDP Configuration |
1032 |
Configuring a Default MSDP Peer |
1032 |
Caching Source-Active State |
1034 |
Requesting Source Information from an MSDP Peer |
1036 |
Controlling Source Information that Your Switch Originates |
1037 |
Redistributing Sources |
1037 |
Filtering Source-Active Request Messages |
1039 |
Controlling Source Information that Your Switch Forwards |
1040 |
Using a Filter |
1040 |
Using TTL to Limit the Multicast Data Sent in SA Messages |
1042 |
Controlling Source Information that Your Switch Receives |
1042 |
Configuring an MSDP Mesh Group |
1044 |
Shutting Down an MSDP Peer |
1044 |
Including a Bordering PIM Dense-Mode Region in MSDP |
1045 |
Configuring an Originating Address other than the RP Address |
1046 |
Monitoring and Maintaining MSDP |
1047 |
Configuring Fallback Bridging |
1049 |
Understanding Fallback Bridging |
1049 |
Fallback Bridging Overview |
1049 |
Fallback Bridging and Switch Stacks |
1051 |
Configuring Fallback Bridging |
1051 |
Default Fallback Bridging Configuration |
1052 |
Fallback Bridging Configuration Guidelines |
1052 |
Creating a Bridge Group |
1052 |
Adjusting Spanning-Tree Parameters |
1054 |
Changing the VLAN-Bridge Spanning-Tree Priority |
1054 |
Changing the Interface Priority |
1055 |
Assigning a Path Cost |
1055 |
Adjusting BPDU Intervals |
1056 |
Disabling the Spanning Tree on an Interface |
1058 |
Monitoring and Maintaining Fallback Bridging |
1059 |
Troubleshooting |
1061 |
Recovering from a Software Failure |
1062 |
Recovering from a Lost or Forgotten Password |
1063 |
Procedure with Password Recovery Enabled |
1064 |
Procedure with Password Recovery Disabled |
1066 |
Preventing Switch Stack Problems |
1067 |
Recovering from a Command Switch Failure |
1068 |
Replacing a Failed Command Switch with a Cluster Member |
1069 |
Replacing a Failed Command Switch with Another Switch |
1071 |
Recovering from Lost Cluster Member Connectivity |
1072 |
Preventing Autonegotiation Mismatches |
1072 |
Troubleshooting Power over Ethernet Switch Ports |
1073 |
Disabled Port Caused by Power Loss |
1073 |
Disabled Port Caused by False Link Up |
1073 |
SFP Module Security and Identification |
1073 |
Monitoring SFP Module Status |
1074 |
Monitoring Temperature |
1074 |
Using Ping |
1074 |
Understanding Ping |
1074 |
Executing Ping |
1075 |
Using Layer 2 Traceroute |
1076 |
Understanding Layer 2 Traceroute |
1076 |
Usage Guidelines |
1076 |
Displaying the Physical Path |
1077 |
Using IP Traceroute |
1077 |
Understanding IP Traceroute |
1077 |
Executing IP Traceroute |
1078 |
Using TDR |
1079 |
Understanding TDR |
1079 |
Running TDR and Displaying the Results |
1080 |
Using Debug Commands |
1080 |
Enabling Debugging on a Specific Feature |
1080 |
Enabling All-System Diagnostics |
1081 |
Redirecting Debug and Error Message Output |
1081 |
Using the show platform forward Command |
1082 |
Using the crashinfo Files |
1084 |
Basic crashinfo Files |
1084 |
Extended crashinfo Files |
1084 |
Configuring Online Diagnostics |
1087 |
Understanding How Online Diagnostics Work |
1087 |
Scheduling Online Diagnostics |
1088 |
Configuring Health-Monitoring Diagnostics |
1088 |
Running Online Diagnostic Tests |
1089 |
Starting Online Diagnostic Tests |
1089 |
Displaying Online Diagnostic Tests and Test Results |
1090 |
Configuring the Catalyst 3750G Integrated Wireless LAN Controller Switch |
1093 |
Understanding the Wireless LAN Controller Switch |
1094 |
The Wireless LAN Controller Switch and Switch Stacks |
1094 |
Controller and Switch Interaction |
1095 |
Internal Ports |
1095 |
Configuring the Wireless LAN Controller Switch |
1096 |
Internal Port Configuration |
1096 |
Reconfiguring the Internal Ports |
1097 |
Accessing the Controller |
1098 |
Displaying Internal Wireless Controller Information |
1099 |
Supported MIBs |
1101 |
MIB List |
1101 |
Using FTP to Access the MIB Files |
1103 |
Working with the Cisco IOS File System, Configuration Files, and Software Images |
1105 |
Working with the Flash File System |
1105 |
Displaying Available File Systems |
1106 |
Setting the Default File System |
1107 |
Displaying Information about Files on a File System |
1107 |
Changing Directories and Displaying the Working Directory |
1108 |
Creating and Removing Directories |
1108 |
Copying Files |
1109 |
Deleting Files |
1109 |
Creating, Displaying, and Extracting tar Files |
1110 |
Creating a tar File |
1110 |
Displaying the Contents of a tar File |
1111 |
Extracting a tar File |
1111 |
Displaying the Contents of a File |
1112 |
Working with Configuration Files |
1112 |
Guidelines for Creating and Using Configuration Files |
1113 |
Configuration File Types and Location |
1114 |
Creating a Configuration File By Using a Text Editor |
1114 |
Copying Configuration Files By Using TFTP |
1114 |
Preparing to Download or Upload a Configuration File By Using TFTP |
1114 |
Downloading the Configuration File By Using TFTP |
1115 |
Uploading the Configuration File By Using TFTP |
1116 |
Copying Configuration Files By Using FTP |
1116 |
Preparing to Download or Upload a Configuration File By Using FTP |
1117 |
Downloading a Configuration File By Using FTP |
1117 |
Uploading a Configuration File By Using FTP |
1118 |
Copying Configuration Files By Using RCP |
1119 |
Preparing to Download or Upload a Configuration File By Using RCP |
1120 |
Downloading a Configuration File By Using RCP |
1121 |
Uploading a Configuration File By Using RCP |
1122 |
Clearing Configuration Information |
1122 |
Clearing the Startup Configuration File |
1123 |
Deleting a Stored Configuration File |
1123 |
Working with Software Images |
1123 |
Image Location on the Switch |
1124 |
tar File Format of Images on a Server or Cisco.com |
1124 |
Copying Image Files By Using TFTP |
1125 |
Preparing to Download or Upload an Image File By Using TFTP |
1126 |
Downloading an Image File By Using TFTP |
1126 |
Uploading an Image File By Using TFTP |
1128 |
Copying Image Files By Using FTP |
1128 |
Preparing to Download or Upload an Image File By Using FTP |
1129 |
Downloading an Image File By Using FTP |
1130 |
Uploading an Image File By Using FTP |
1132 |
Copying Image Files By Using RCP |
1133 |
Preparing to Download or Upload an Image File By Using RCP |
1134 |
Downloading an Image File By Using RCP |
1135 |
Uploading an Image File By Using RCP |
1136 |
Copying an Image File from One Stack Member to Another |
1137 |
Unsupported Commands in CiscoIOSRelease12.2(35)SE |
1139 |
Access Control Lists |
1139 |
Unsupported Privileged EXEC Commands |
1139 |
Unsupported Global Configuration Commands |
1139 |
Unsupported Route-Map Configuration Commands |
1139 |
Archive Commands |
1140 |
Unsupported Privileged EXEC Commands |
1140 |
ARP Commands |
1140 |
Unsupported Global Configuration Commands |
1140 |
Unsupported Interface Configuration Commands |
1140 |
Boot Loader Commands |
1140 |
Unsupported Global Configuration Commands |
1140 |
FallBack Bridging |
1140 |
Unsupported Privileged EXEC Commands |
1140 |
Unsupported Global Configuration Commands |
1141 |
Unsupported Interface Configuration Commands |
1141 |
HSRP |
1142 |
Unsupported Global Configuration Commands |
1142 |
Unsupported Interface Configuration Commands |
1142 |
IGMP Snooping Commands |
1142 |
Unsupported Global Configuration Commands |
1142 |
Interface Commands |
1143 |
Unsupported Privileged EXEC Commands |
1143 |
Unsupported Global Configuration Commands |
1143 |
Unsupported Interface Configuration Commands |
1143 |
IP Multicast Routing |
1143 |
Unsupported Privileged EXEC Commands |
1143 |
Unsupported Global Configuration Commands |
1144 |
Unsupported Interface Configuration Commands |
1144 |
IP Unicast Routing |
1144 |
Unsupported Privileged EXEC or User EXEC Commands |
1144 |
Unsupported Global Configuration Commands |
1145 |
Unsupported Interface Configuration Commands |
1145 |
Unsupported BGP Router Configuration Commands |
1145 |
Unsupported VPN Configuration Commands |
1146 |
Unsupported Route Map Commands |
1146 |
MAC Address Commands |
1146 |
Unsupported Privileged EXEC Commands |
1146 |
Unsupported Global Configuration Commands |
1147 |
Miscellaneous |
1147 |
Unsupported Privileged EXEC Commands |
1147 |
Unsupported Global Configuration Commands |
1147 |
MSDP |
1148 |
Unsupported Privileged EXEC Commands |
1148 |
Unsupported Global Configuration Commands |
1148 |
NetFlow Commands |
1148 |
Unsupported Global Configuration Commands |
1148 |
Network Address Translation (NAT) Commands |
1148 |
Unsupported Privileged EXEC Commands |
1148 |
QoS |
1149 |
Unsupported Global Configuration Commands |
1149 |
Unsupported Interface Configuration Commands |
1149 |
Unsupported Policy-Map Configuration Commands |
1149 |
RADIUS |
1149 |
Unsupported Global Configuration Commands |
1149 |
SNMP |
1149 |
Unsupported Global Configuration Commands |
1149 |
Spanning Tree |
1149 |
Unsupported Global Configuration Command |
1149 |
Unsupported Interface Configuration Command |
1150 |
VLAN |
1150 |
Unsupported Global Configuration Commands |
1150 |
Unsupported User EXEC Commands |
1150 |
VTP |
1150 |
Unsupported Privileged EXEC Commands |
1150 |