Section |
Page |
Cisco ME 3800X and 3600X Switch Software Configuration Guide |
1 |
Contents |
3 |
Preface |
35 |
Audience |
35 |
Purpose |
35 |
Conventions |
35 |
Related Publications |
36 |
Obtaining Documentation and Submitting a Service Request |
37 |
Overview |
39 |
Software Licenses and Features |
39 |
Features |
40 |
Performance Features |
40 |
Management Options |
41 |
Manageability Features |
41 |
Availability Features |
43 |
VLAN Features |
43 |
Security Features |
44 |
Switch Security |
44 |
Network Security |
44 |
Quality of Service and Class of Service Features |
45 |
Layer 2 Virtual Private Network Services |
45 |
Layer 3 Features |
46 |
Layer 3 VPN Services |
46 |
Monitoring Features |
47 |
Feature Support per License |
47 |
Where to Go Next |
49 |
Using the Command-Line Interface |
51 |
Understanding Command Modes |
51 |
Understanding the Help System |
53 |
Understanding Abbreviated Commands |
53 |
Understanding no and default Forms of Commands |
54 |
Understanding CLI Error Messages |
54 |
Using Command History |
54 |
Changing the Command History Buffer Size |
55 |
Recalling Commands |
55 |
Disabling the Command History Feature |
55 |
Using Editing Features |
56 |
Enabling and Disabling Editing Features |
56 |
Editing Commands through Keystrokes |
56 |
Editing Command Lines that Wrap |
58 |
Searching and Filtering Output of show and more Commands |
58 |
Accessing the CLI |
59 |
Accessing the CLI through a Console Connection or through Telnet |
59 |
Assigning the Switch IP Address and Default Gateway |
61 |
Understanding the Boot Process |
61 |
Initial Configuration |
62 |
Assigning Switch Information |
63 |
Default Switch Information |
63 |
Understanding DHCP-Based Autoconfiguration |
64 |
DHCP Client Request Process |
64 |
Understanding DHCP-based Autoconfiguration and Image Update |
65 |
DHCP Autoconfiguration |
65 |
DHCP Auto-Image Update |
65 |
Limitations and Restrictions |
66 |
Configuring DHCP-Based Autoconfiguration |
66 |
DHCP Server Configuration Guidelines |
67 |
Configuring the TFTP Server |
67 |
Configuring the DNS |
68 |
Configuring the Relay Device |
68 |
Obtaining Configuration Files |
69 |
Example Configuration |
70 |
Configuring the DHCP Auto Configuration and Image Update Features |
71 |
Configuring DHCP Autoconfiguration (Only Configuration File) |
72 |
Configuring DHCP Auto-Image Update (Configuration File and Image) |
73 |
Configuring the Client |
74 |
Manually Assigning IP Information |
75 |
Checking and Saving the Running Configuration |
76 |
Modifying the Startup Configuration |
77 |
Default Boot Configuration |
78 |
Automatically Downloading a Configuration File |
78 |
Specifying the Filename to Read and Write the System Configuration |
78 |
Booting Manually |
79 |
Booting a Specific Software Image |
79 |
Controlling Environment Variables |
80 |
Scheduling a Reload of the Software Image |
81 |
Configuring a Scheduled Reload |
82 |
Displaying Scheduled Reload Information |
83 |
Configuring Cisco IOS Configuration Engine |
85 |
Understanding Cisco Configuration Engine Software |
85 |
Configuration Service |
86 |
Event Service |
87 |
NameSpace Mapper |
87 |
What You Should Know About the CNS IDs and Device Hostnames |
87 |
ConfigID |
87 |
DeviceID |
88 |
Hostname and DeviceID |
88 |
Using Hostname, DeviceID, and ConfigID |
88 |
Understanding Cisco IOS Agents |
89 |
Initial Configuration |
89 |
Incremental (Partial) Configuration |
90 |
Synchronized Configuration |
90 |
Configuring Cisco IOS Agents |
90 |
Enabling Automated CNS Configuration |
90 |
Enabling the CNS Event Agent |
91 |
Enabling the Cisco IOS CNS Agent |
92 |
Enabling an Initial Configuration |
93 |
Enabling a Partial Configuration |
96 |
Upgrading Devices with Cisco IOS Image Agent |
97 |
Prerequisites for the CNS Image Agent |
97 |
Restrictions for the CNS Image Agent |
97 |
Displaying CNS Configuration |
98 |
Administering the Switch |
99 |
Managing the System Time and Date |
99 |
Understanding the System Clock |
99 |
Understanding Network Time Protocol |
100 |
Configuring NTP |
101 |
Default NTP Configuration |
102 |
Configuring NTP Authentication |
102 |
Configuring NTP Associations |
103 |
Configuring NTP Broadcast Service |
104 |
Configuring NTP Access Restrictions |
106 |
Configuring the Source IP Address for NTP Packets |
108 |
Displaying the NTP Configuration |
109 |
Configuring Time and Date Manually |
109 |
Setting the System Clock |
109 |
Displaying the Time and Date Configuration |
110 |
Configuring the Time Zone |
110 |
Configuring Summer Time (Daylight Saving Time) |
111 |
Configuring a System Name and Prompt |
112 |
Default System Name and Prompt Configuration |
113 |
Configuring a System Name |
113 |
Understanding DNS |
113 |
Default DNS Configuration |
114 |
Setting Up DNS |
114 |
Displaying the DNS Configuration |
115 |
Creating a Banner |
115 |
Default Banner Configuration |
115 |
Configuring a Message-of-the-Day Login Banner |
116 |
Configuring a Login Banner |
117 |
Managing the MAC Address Table |
117 |
Building the Address Table |
118 |
MAC Addresses and VLANs |
118 |
Default MAC Address Table Configuration |
119 |
Changing the Address Aging Time |
119 |
Removing Dynamic Address Entries |
119 |
Configuring MAC Address Change Notification Traps |
120 |
Configuring MAC Address Move Notification Traps |
122 |
Configuring MAC Threshold Notification Traps |
123 |
Adding and Removing Static Address Entries |
124 |
Configuring Unicast MAC Address Filtering |
125 |
Disabling MAC Address Learning on a VLAN |
126 |
Displaying Address Table Entries |
127 |
Managing the ARP Table |
128 |
Configuring Synchronous Ethernet |
129 |
Understanding SyncE |
129 |
Reference Clocks |
129 |
SyncE Timing Using REP for Loop Prevention and Resiliency |
130 |
BITS Interface |
133 |
Configuring SyncE |
133 |
Default SyncE Configuration |
134 |
Configuring the Network Clock Selection |
134 |
Configuring the BITS Interface |
135 |
Selecting the Network Clock |
137 |
Configuring REP for the SyncE Network |
138 |
Monitoring SyncE |
139 |
Configuring the Switch External Alarms |
141 |
Understanding Switch Alarms |
141 |
Configuring Switch Alarms |
142 |
Configuring Switch-Based Authentication |
145 |
Preventing Unauthorized Access to Your Switch |
145 |
Protecting Access to Privileged EXEC Commands |
146 |
Default Password and Privilege Level Configuration |
146 |
Setting or Changing a Static Enable Password |
147 |
Protecting Enable and Enable Secret Passwords with Encryption |
147 |
Disabling Password Recovery |
149 |
Setting a Telnet Password for a Terminal Line |
150 |
Configuring Username and Password Pairs |
150 |
Configuring Multiple Privilege Levels |
151 |
Setting the Privilege Level for a Command |
152 |
Changing the Default Privilege Level for Lines |
153 |
Logging into and Exiting a Privilege Level |
153 |
Controlling Switch Access with TACACS+ |
154 |
Understanding TACACS+ |
154 |
TACACS+ Operation |
156 |
Configuring TACACS+ |
156 |
Default TACACS+ Configuration |
157 |
Identifying the TACACS+ Server Host and Setting the Authentication Key |
157 |
Configuring TACACS+ Login Authentication |
158 |
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services |
160 |
Starting TACACS+ Accounting |
160 |
Displaying the TACACS+ Configuration |
161 |
Controlling Switch Access with RADIUS |
161 |
Understanding RADIUS |
161 |
RADIUS Operation |
163 |
Configuring RADIUS |
163 |
Default RADIUS Configuration |
164 |
Identifying the RADIUS Server Host |
164 |
Configuring RADIUS Login Authentication |
166 |
Defining AAA Server Groups |
168 |
Configuring RADIUS Authorization for User Privileged Access and Network Services |
170 |
Starting RADIUS Accounting |
171 |
Configuring Settings for All RADIUS Servers |
172 |
Configuring the Switch to Use Vendor-Specific RADIUS Attributes |
172 |
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication |
173 |
Configuring RADIUS Server Load Balancing |
174 |
Displaying the RADIUS Configuration |
174 |
Controlling Switch Access with Kerberos |
175 |
Understanding Kerberos |
175 |
Kerberos Operation |
177 |
Authenticating to a Boundary Switch |
177 |
Obtaining a TGT from a KDC |
178 |
Authenticating to Network Services |
178 |
Configuring Kerberos |
178 |
Configuring the Switch for Local Authentication and Authorization |
179 |
Configuring the Switch for Secure Shell |
180 |
Understanding SSH |
180 |
SSH Servers, Integrated Clients, and Supported Versions |
180 |
Limitations |
181 |
Configuring SSH |
181 |
Configuration Guidelines |
181 |
Setting Up the Switch to Run SSH |
181 |
Configuring the SSH Server |
182 |
Displaying the SSH Configuration and Status |
183 |
Configuring the Switch for Secure Copy Protocol |
183 |
Information About Secure Copy |
184 |
Configuring Interfaces |
185 |
Understanding Interface Types |
185 |
NNI Port Type |
186 |
Port-Based VLANs |
186 |
Switch Ports |
186 |
Access Ports |
187 |
Trunk Ports |
187 |
Routed Ports |
187 |
Ethernet Management Port |
188 |
Switch Virtual Interfaces |
188 |
EtherChannel Port Groups |
188 |
Ethernet Flow Points |
189 |
Connecting Interfaces |
189 |
Using Interface Configuration Mode |
190 |
Procedures for Configuring Interfaces |
190 |
Configuring a Range of Interfaces |
191 |
Configuring and Using Interface Range Macros |
192 |
Using the Ethernet Management Port |
194 |
Understanding the Ethernet Management Port |
194 |
Supported Features on the Ethernet Management Port |
196 |
Configuring the Ethernet Management Port |
196 |
TFTP and the Ethernet Management Port |
196 |
Configuring Ethernet Interfaces |
197 |
Default Ethernet Interface Configuration |
197 |
Configuring Interface Speed and Duplex Mode |
198 |
Speed and Duplex Configuration Guidelines |
198 |
Setting the Interface Speed and Duplex Parameters |
199 |
Configuring IEEE 802.3x Flow Control |
201 |
Configuring Auto-MDIX on an Interface |
202 |
Adding a Description for an Interface |
203 |
Configuring Layer 3 Interfaces |
203 |
Configuring the Interface MTU |
205 |
Monitoring and Maintaining the Interfaces |
205 |
Monitoring Interface Status |
205 |
Clearing and Resetting Interfaces and Counters |
207 |
Shutting Down and Restarting the Interface |
207 |
Configuring VLANs |
209 |
Understanding VLANs |
209 |
Supported VLANs |
211 |
Normal-Range VLANs |
211 |
Extended-Range VLANs |
212 |
VLAN Port Membership Modes |
212 |
UNI VLANs |
212 |
Creating and Modifying VLANs |
213 |
Default Ethernet VLAN Configuration |
213 |
VLAN Configuration Guidelines |
214 |
Creating or Modifying an Ethernet VLAN |
215 |
Assigning Static-Access Ports to a VLAN |
216 |
Displaying VLANs |
217 |
Configuring VLAN Trunks |
217 |
Trunking Overview |
217 |
IEEE 802.1Q Configuration Considerations |
218 |
Default Layer 2 Ethernet Interface VLAN Configuration |
218 |
Configuring an Ethernet Interface as a Trunk Port |
219 |
Interaction with EtherChannels |
219 |
Configuring a Trunk Port |
219 |
Defining the Allowed VLANs on a Trunk |
220 |
Configuring the Native VLAN for Untagged Traffic |
221 |
Configuring Trunk Ports for Load Sharing |
222 |
Load Sharing Using STP Port Priorities |
222 |
Load Sharing Using STP Path Cost |
223 |
Configuring Ethernet Virtual Connections (EVCs) |
227 |
Supported EVC Features |
228 |
Understanding EVC Features |
229 |
Ethernet Virtual Connections |
229 |
Service Instances and EFPs |
229 |
Encapsulation |
230 |
Bridge Domains |
232 |
Split-Horizon |
232 |
Rewrite Operations |
233 |
Configuring EFPs |
234 |
Default EVC Configuration |
234 |
Configuration Guidelines |
234 |
Creating Service Instances |
235 |
Configuration Examples |
236 |
Configuring a Service Instance |
236 |
Encapsulation Using a VLAN Range |
236 |
Two Service Instances Joining the Same Bridge Domain |
236 |
Bridge Domains and VLAN Encapsulation |
237 |
Rewrite |
237 |
Split Horizon |
237 |
Hairpinning |
238 |
Egress Filtering |
238 |
Examples of Unsupported Configurations |
239 |
Overlapping Encapsulation |
239 |
Global Rewrite Operation Limitation on a Switch |
240 |
Configuring Other Features on EFPs |
241 |
EFPs and EtherChannels |
241 |
EFPs and Layer 2 Protocols |
242 |
MAC Address Forwarding, Learning and Aging on EFPs |
242 |
Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling using EFPs |
243 |
802.1Q Tunneling (QinQ) |
243 |
Layer 2 Protocol Tunneling |
247 |
EFPs and Ethernet over Multiprotocol Layer Switching (EoMPLS) |
250 |
Bridge Domain Routing |
250 |
EFPs and Switchport MAC Addresses |
251 |
EVC and Switchports |
251 |
EFPs and MSTP |
255 |
Monitoring EVC |
255 |
Configuring Command Macros |
259 |
Understanding Command Macros |
259 |
Configuring Command Macros |
259 |
Default Command Macro Configuration |
260 |
Command Macro Configuration Guidelines |
260 |
Creating Command Macros |
261 |
Applying Command Macros |
262 |
Displaying Command Macros |
263 |
Configuring STP |
265 |
Understanding Spanning-Tree Features |
265 |
STP Overview |
266 |
Spanning-Tree Topology and BPDUs |
266 |
Bridge ID, Switch Priority, and Extended System ID |
267 |
Spanning-Tree Interface States |
268 |
Blocking State |
269 |
Listening State |
270 |
Learning State |
270 |
Forwarding State |
270 |
Disabled State |
270 |
How a Switch or Port Becomes the Root Switch or Root Port |
271 |
Spanning Tree and Redundant Connectivity |
271 |
Spanning-Tree Address Management |
272 |
Accelerated Aging to Retain Connectivity |
272 |
Spanning-Tree Modes and Protocols |
273 |
Supported Spanning-Tree Instances |
273 |
Spanning-Tree Interoperability and Backward Compatibility |
274 |
STP and IEEE 802.1Q Trunks |
274 |
Configuring Spanning-Tree Features |
274 |
Default Spanning-Tree Configuration |
275 |
Spanning-Tree Configuration Guidelines |
275 |
Changing the Spanning-Tree Mode. |
276 |
Disabling Spanning Tree |
277 |
Configuring the Root Switch |
278 |
Configuring a Secondary Root Switch |
279 |
Configuring Port Priority |
280 |
Configuring Path Cost |
282 |
Configuring the Switch Priority of a VLAN |
283 |
Configuring Spanning-Tree Timers |
284 |
Configuring the Hello Time |
284 |
Configuring the Forwarding-Delay Time for a VLAN |
285 |
Configuring the Maximum-Aging Time for a VLAN |
285 |
Displaying the Spanning-Tree Status |
286 |
Configuring MSTP |
287 |
Understanding MSTP |
288 |
Multiple Spanning-Tree Regions |
288 |
IST, CIST, and CST |
288 |
Operations Within an MST Region |
289 |
Operations Between MST Regions |
289 |
IEEE 802.1s Terminology |
291 |
Hop Count |
291 |
Boundary Ports |
292 |
IEEE 802.1s Implementation |
292 |
Port Role Naming Change |
292 |
Interoperation Between Legacy and Standard Switches |
293 |
Detecting Unidirectional Link Failure |
293 |
Interoperability with IEEE 802.1D STP |
294 |
Understanding RSTP |
294 |
Port Roles and the Active Topology |
295 |
Rapid Convergence |
295 |
Synchronization of Port Roles |
297 |
Bridge Protocol Data Unit Format and Processing |
298 |
Processing Superior BPDU Information |
299 |
Processing Inferior BPDU Information |
299 |
Topology Changes |
299 |
Configuring MSTP Features |
300 |
Default MSTP Configuration |
300 |
MSTP Configuration Guidelines |
301 |
Specifying the MST Region Configuration and Enabling MSTP |
302 |
Configuring the Root Switch |
303 |
Configuring a Secondary Root Switch |
304 |
Configuring Port Priority |
305 |
Configuring Path Cost |
307 |
Configuring the Switch Priority |
308 |
MSTP and Ethernet Flow Points (EFPs) |
309 |
Configuring the Hello Time |
309 |
Configuring the Forwarding-Delay Time |
309 |
Configuring the Maximum-Aging Time |
310 |
Configuring the Maximum-Hop Count |
310 |
Specifying the Link Type to Ensure Rapid Transitions |
311 |
Designating the Neighbor Type |
312 |
Restarting the Protocol Migration Process |
312 |
Displaying the MST Configuration and Status |
313 |
Configuring Optional Spanning-Tree Features |
315 |
Understanding Optional Spanning-Tree Features |
315 |
Understanding Port Fast |
316 |
Understanding BPDU Guard |
316 |
Understanding BPDU Filtering |
317 |
Understanding EtherChannel Guard |
317 |
Understanding Root Guard |
317 |
Understanding Loop Guard |
318 |
Configuring Optional Spanning-Tree Features |
319 |
Default Optional Spanning-Tree Configuration |
319 |
Optional Spanning-Tree Configuration Guidelines |
319 |
Enabling Port Fast |
319 |
Enabling BPDU Guard |
320 |
Enabling BPDU Filtering |
321 |
Enabling EtherChannel Guard |
322 |
Enabling Root Guard |
323 |
Enabling Loop Guard |
323 |
Displaying the Spanning-Tree Status |
324 |
Configuring Resilient Ethernet Protocol |
325 |
Understanding REP |
325 |
Link Integrity |
327 |
Fast Convergence |
328 |
VLAN Load Balancing |
328 |
Spanning Tree Interaction |
330 |
REP Ports |
330 |
Configuring REP |
330 |
Default REP Configuration |
331 |
REP Configuration Guidelines |
331 |
Configuring the REP Administrative VLAN |
332 |
Configuring REP Interfaces |
333 |
Setting Manual Preemption for VLAN Load Balancing |
337 |
Configuring SNMP Traps for REP |
337 |
Monitoring REP |
338 |
Configuring Flex Links and the MAC Address-Table Move Update Feature |
339 |
Understanding Flex Links and the MAC Address-Table Move Update |
339 |
Flex Links |
339 |
VLAN Flex Link Load Balancing and Support |
340 |
Flex Link Multicast Fast Convergence |
341 |
Learning the Other Flex Link Port as the mrouter Port |
341 |
Generating IGMP Reports |
341 |
Leaking IGMP Reports |
342 |
MAC Address-Table Move Update |
344 |
Configuring Flex Links and MAC Address-Table Move Update |
345 |
Default Configuration |
345 |
Configuration Guidelines |
346 |
Configuring Flex Links |
346 |
Configuring VLAN Load Balancing on Flex Links |
348 |
Configuring the MAC Address-Table Move Update Feature |
349 |
Monitoring Flex Links and the MAC Address-Table Move Update |
351 |
Configuring IGMP Snooping |
353 |
Understanding IGMP Snooping |
353 |
IGMP Versions |
354 |
Joining a Multicast Group |
355 |
Leaving a Multicast Group |
356 |
Immediate Leave |
357 |
IGMP Configurable-Leave Timer |
357 |
IGMP Report Suppression |
357 |
Configuring IGMP Snooping |
358 |
Default IGMP Snooping Configuration |
358 |
Enabling or Disabling IGMP Snooping |
358 |
Configuring a Multicast Router Port |
359 |
Configuring a Host Statically to Join a Group |
360 |
Enabling IGMP Immediate Leave |
360 |
Configuring the IGMP Leave Timer |
361 |
Configuring TCN-Related Commands |
362 |
Controlling the Multicast Flooding Time After a TCN Event |
362 |
Recovering from Flood Mode |
362 |
Disabling Multicast Flooding During a TCN Event |
363 |
Disabling IGMP Report Suppression |
364 |
Displaying IGMP Snooping Information |
364 |
Configuring IGMP Filtering and Throttling |
365 |
Default IGMP Filtering and Throttling Configuration |
366 |
Configuring IGMP Profiles |
366 |
Applying IGMP Profiles |
367 |
Setting the Maximum Number of IGMP Groups |
368 |
Configuring the IGMP Throttling Action |
369 |
Displaying IGMP Filtering and Throttling Configuration |
370 |
Configuring Traffic Control |
371 |
Configuring Storm Control |
371 |
Understanding Storm Control |
371 |
Default Storm Control Configuration |
373 |
Configuring Storm Control and Threshold Levels |
373 |
Configuring Port Blocking |
375 |
Default Port Blocking Configuration |
375 |
Blocking Flooded Traffic on an Interface |
375 |
Configuring EVC MAC Security |
376 |
Understanding MAC Security |
377 |
Secure MAC Addresses |
377 |
Security Violations |
377 |
Default EVC MAC Security Configuration |
378 |
MAC Address Security Guidelines |
379 |
Enabling and Configuring EVC MAC Security |
379 |
Displaying Traffic Control Settings |
382 |
Configuring CDP |
383 |
Understanding CDP |
383 |
Configuring CDP |
384 |
Default CDP Configuration |
384 |
Configuring the CDP Characteristics |
384 |
Disabling and Enabling CDP |
385 |
Disabling and Enabling CDP on an Interface |
386 |
CDP and Ethernet Flow Points (EFPs) |
386 |
Monitoring and Maintaining CDP |
387 |
Configuring LLDP and LLDP-MED |
389 |
Understanding LLDP and LLDP-MED |
389 |
Understanding LLDP |
389 |
Understanding LLDP-MED |
390 |
Configuring LLDP and LLDP-MED |
391 |
Default LLDP Configuration |
391 |
Configuring LLDP Characteristics |
391 |
Disabling and Enabling LLDP Globally |
392 |
Disabling and Enabling LLDP on an Interface |
393 |
Configuring LLDP-MED TLVs |
394 |
LLDP and Ethernet Flow Points (EFPs) |
395 |
Monitoring and Maintaining LLDP and LLDP-MED |
395 |
Configuring UDLD |
397 |
Understanding UDLD |
397 |
Modes of Operation |
397 |
Methods to Detect Unidirectional Links |
398 |
Configuring UDLD |
399 |
Default UDLD Configuration |
400 |
Configuration Guidelines |
400 |
Enabling UDLD Globally |
401 |
Enabling UDLD on an Interface |
401 |
Resetting an Interface Disabled by UDLD |
402 |
UDLD and Ethernet Flow Points (EFPs) |
402 |
Displaying UDLD Status |
403 |
Configuring RMON |
405 |
Understanding RMON |
405 |
Configuring RMON |
407 |
Default RMON Configuration |
407 |
Configuring RMON Alarms and Events |
407 |
Collecting Group History Statistics on an Interface |
409 |
Collecting Group Ethernet Statistics on an Interface |
409 |
Displaying RMON Status |
410 |
Configuring System Message Logging |
411 |
Understanding System Message Logging |
411 |
Configuring System Message Logging |
412 |
System Log Message Format |
412 |
Default System Message Logging Configuration |
413 |
Disabling Message Logging |
413 |
Setting the Message Display Destination Device |
414 |
Synchronizing Log Messages |
415 |
Enabling and Disabling Time Stamps on Log Messages |
417 |
Enabling and Disabling Sequence Numbers in Log Messages |
417 |
Defining the Message Severity Level |
418 |
Limiting Syslog Messages Sent to the History Table and to SNMP |
419 |
Enabling the Configuration-Change Logger |
420 |
Configuring UNIX Syslog Servers |
421 |
Logging Messages to a UNIX Syslog Daemon |
421 |
Configuring the UNIX System Logging Facility |
422 |
Displaying the Logging Configuration |
423 |
Configuring SNMP |
425 |
Understanding SNMP |
425 |
SNMP Versions |
426 |
SNMP Manager Functions |
427 |
SNMP Agent Functions |
428 |
SNMP Community Strings |
428 |
Using SNMP to Access MIB Variables |
428 |
SNMP Notifications |
429 |
SNMP ifIndex MIB Object Values |
429 |
MIB Data Collection and Transfer |
430 |
Configuring SNMP |
430 |
Default SNMP Configuration |
431 |
SNMP Configuration Guidelines |
431 |
Disabling the SNMP Agent |
432 |
Configuring Community Strings |
432 |
Configuring SNMP Groups and Users |
434 |
Configuring SNMP Notifications |
436 |
Setting the CPU Threshold Notification Types and Values |
440 |
Setting the Agent Contact and Location Information |
441 |
Limiting TFTP Servers Used Through SNMP |
441 |
Configuring MIB Data Collection and Transfer |
442 |
Configuring the Cisco Process MIB CPU Threshold Table |
444 |
SNMP Examples |
445 |
Displaying SNMP Status |
447 |
Configuring Network Security with ACLs |
449 |
Understanding ACLs |
449 |
Supported ACLs |
450 |
Port ACLs |
451 |
Router ACLs |
452 |
VLAN Maps |
453 |
Handling Fragmented and Unfragmented Traffic |
453 |
Configuring IPv4 ACLs |
454 |
Creating Standard and Extended IPv4 ACLs |
455 |
IPv4 Access List Numbers |
456 |
ACL Logging |
456 |
Creating a Numbered Standard ACL |
457 |
Creating a Numbered Extended ACL |
458 |
Resequencing ACEs in an ACL |
462 |
Creating Named Standard and Extended ACLs |
462 |
Using Time Ranges with ACLs |
464 |
Including Comments in ACLs |
466 |
Applying an IPv4 ACL to a Terminal Line |
466 |
Applying an IPv4 ACL to an Interface |
467 |
Hardware and Software Treatment of IP ACLs |
468 |
Troubleshooting ACLs |
469 |
IPv4 ACL Configuration Examples |
470 |
Numbered ACLs |
471 |
Extended ACLs |
471 |
Named ACLs |
472 |
Time Range Applied to an IP ACL |
472 |
Commented IP ACL Entries |
473 |
ACL Logging |
473 |
Creating Named MAC Extended ACLs |
474 |
Applying a MAC ACL to a Layer 2 Interface |
476 |
Configuring VLAN Maps |
477 |
VLAN Map Configuration Guidelines |
477 |
Creating a VLAN Map |
478 |
Examples of ACLs and VLAN Maps |
479 |
Applying a VLAN Map to a VLAN |
481 |
Using VLAN Maps in Your Network |
481 |
Wiring Closet Configuration |
481 |
Denying Access to a Server on Another VLAN |
482 |
Using VLAN Maps with Router ACLs |
483 |
VLAN Maps and Router ACL Configuration Guidelines |
484 |
Examples of Router ACLs and VLAN Maps Applied to VLANs |
485 |
ACLs and Switched Packets |
485 |
ACLs and Routed Packets |
485 |
ACLs and Multicast Packets |
486 |
Displaying IPv4 ACL Configuration |
487 |
Configuring QoS |
489 |
Understanding QoS |
490 |
Modular QoS CLI Configuration |
491 |
Hierarchical QoS |
492 |
Classification |
493 |
The match Command |
494 |
Classification Based on Layer 2 CoS |
495 |
Classification Based on IP Precedence |
495 |
Classification Based on IP DSCP |
495 |
CoS Mapping |
496 |
Ingress Classification Based on QoS ACLs |
497 |
Classification Based on QoS Groups |
498 |
Classification Based on Discard Class |
499 |
Classification Based on VLAN IDs |
499 |
Classification for MPLS and EoMPLS |
499 |
Policing |
501 |
Marking |
502 |
Congestion Avoidance and Queuing |
503 |
Congestion Management and Scheduling |
505 |
Traffic Shaping |
506 |
Class-Based Weighted Fair Queuing |
507 |
Priority Queuing |
508 |
Input and Output Policy Maps |
508 |
Input Policy Maps |
510 |
Output Policy Maps |
510 |
QoS Treatment for Performance-Monitoring Protocols |
511 |
Cisco IP-SLAs Probes |
511 |
CPU Traffic |
511 |
Configuring QoS |
512 |
Default QoS Configuration |
512 |
Configuration Guidelines and Limitations |
512 |
Configuring Input Policy Maps |
513 |
Configuring Input Class Maps |
514 |
Using ACLs to Classify Traffic |
516 |
Configuring Class-Based Marking |
520 |
Configuring Policing |
522 |
Configuring Output Policy Maps |
529 |
Configuring Output Class Maps |
529 |
Configuring Class-Based-Weighted Fair Queuing |
532 |
Configuring Class-Based Shaping |
535 |
Configuring Port Shaping |
536 |
Configuring Class-Based Priority Queuing |
537 |
Configuring Weighted Tail Drop |
538 |
Hierarchical Policy Maps Configuration Examples |
540 |
Configuring MPLS and EoMPLS QoS |
541 |
Default MPLS and EoMPLS QoS Configuration |
541 |
MPLS QoS Configuration Guidelines |
542 |
Setting the Priority of Packets with Experimental Bits |
542 |
MPLS DiffServ Tunneling Modes |
543 |
Attaching a Service Policy to an Interface or EFP |
544 |
Displaying QoS Information |
545 |
Configuring EtherChannels |
547 |
Understanding EtherChannels |
547 |
EtherChannel Overview |
547 |
Port-Channel Interfaces |
549 |
Port Aggregation Protocol |
550 |
PAgP Modes |
550 |
PAgP Interaction with Other Features |
551 |
Link Aggregation Control Protocol |
551 |
LACP Modes |
551 |
LACP Interaction with Other Features |
552 |
EtherChannel On Mode |
552 |
Load Balancing and Forwarding Methods |
552 |
Configuring EtherChannels |
554 |
Default EtherChannel Configuration |
555 |
EtherChannel Configuration Guidelines |
555 |
Configuring Layer 2 EtherChannels |
556 |
Configuring Layer 3 EtherChannels |
558 |
Creating Port-Channel Logical Interfaces |
558 |
Configuring the Physical Interfaces |
559 |
Configuring EtherChannel Load Balancing |
561 |
Configuring the PAgP Learn Method and Priority |
562 |
Configuring LACP Hot-Standby Ports |
563 |
Configuring the LACP System Priority |
564 |
Configuring the LACP Port Priority |
564 |
EtherChannels and Ethernet Flow Points (EFPs) |
565 |
Displaying EtherChannel, PAgP, and LACP Status |
566 |
Configuring IP Unicast Routing |
567 |
Understanding IP Routing |
567 |
Types of Routing |
568 |
Steps for Configuring Routing |
568 |
Configuring IP Addressing |
569 |
Default Addressing Configuration |
569 |
Assigning IP Addresses to Network Interfaces |
570 |
Use of Subnet Zero |
571 |
Classless Routing |
571 |
Configuring Address Resolution Methods |
573 |
Define a Static ARP Cache |
573 |
Set ARP Encapsulation |
575 |
Enable Proxy ARP |
575 |
Routing Assistance When IP Routing is Disabled |
576 |
Proxy ARP |
576 |
Default Gateway |
576 |
ICMP Router Discovery Protocol (IRDP) |
576 |
Configuring Broadcast Packet Handling |
578 |
Enabling Directed Broadcast-to-Physical Broadcast Translation |
578 |
Forwarding UDP Broadcast Packets and Protocols |
579 |
Establishing an IP Broadcast Address |
580 |
Flooding IP Broadcasts |
580 |
Monitoring and Maintaining IP Addressing |
582 |
Enabling IPv4 Unicast Routing |
582 |
Configuring RIP |
583 |
Default RIP Configuration |
584 |
Configuring Basic RIP Parameters |
584 |
Configuring RIP Authentication |
586 |
Configuring Split Horizon |
586 |
Configuring Summary Addresses |
587 |
Configuring OSPF |
588 |
Default OSPF Configuration |
589 |
Nonstop Forwarding Awareness |
590 |
Configuring Basic OSPF Parameters |
590 |
Configuring OSPF Interfaces |
591 |
Configuring OSPF Network Types |
593 |
Configuring OSPF for Nonbroadcast Networks |
593 |
Configuring Network Types for OSPF Interfaces |
593 |
Configuring OSPF Area Parameters |
595 |
Configuring Other OSPF Parameters |
596 |
Changing LSA Group Pacing |
597 |
Configuring a Loopback Interface |
598 |
Monitoring OSPF |
599 |
Configuring EIGRP |
599 |
Default EIGRP Configuration |
601 |
Nonstop Forwarding Awareness |
602 |
Configuring Basic EIGRP Parameters |
602 |
Configuring EIGRP Interfaces |
603 |
Configuring EIGRP Route Authentication |
604 |
Configuring EIGRP Stub Routing |
605 |
Monitoring and Maintaining EIGRP |
606 |
Configuring BGP |
607 |
Default BGP Configuration |
609 |
Nonstop Forwarding Awareness |
611 |
Enabling BGP Routing |
611 |
Managing Routing Policy Changes |
613 |
Configuring BGP Decision Attributes |
614 |
Configuring BGP Filtering with Route Maps |
616 |
Configuring BGP Filtering by Neighbor |
617 |
Configuring Prefix Lists for BGP Filtering |
618 |
Configuring BGP Community Filtering |
619 |
Configuring BGP Neighbors and Peer Groups |
621 |
Configuring Aggregate Addresses |
623 |
Configuring Routing Domain Confederations |
623 |
Configuring BGP Route Reflectors |
624 |
Configuring Route Dampening |
625 |
Monitoring and Maintaining BGP |
626 |
Configuring ISO CLNS Routing |
627 |
Configuring IS-IS Dynamic Routing |
628 |
Default IS-IS Configuration |
628 |
Nonstop Forwarding Awareness |
629 |
Enabling IS-IS Routing |
629 |
Configuring IS-IS Global Parameters |
631 |
Configuring IS-IS Interface Parameters |
634 |
Monitoring and Maintaining IS-IS |
636 |
Configuring BFD |
637 |
Default BFD Configuration |
638 |
Default BFD Configuration Guidelines |
639 |
Configuring BFD Session Parameters on an Interface |
639 |
Enabling BFD Routing Protocol Clients |
640 |
Configuring BFD for OSPF |
640 |
Configuring BFD for IS-IS |
642 |
Configuring BFD for BGP |
643 |
Configuring BFD for EIGRP |
644 |
Configuring BFD for HSRP |
644 |
Disabling BFD Echo Mode |
645 |
Configuring Multi-VRF CE |
646 |
Understanding Multi-VRF CE |
646 |
Default Multi-VRF CE Configuration |
648 |
Multi-VRF CE Configuration Guidelines |
648 |
Configuring VRFs |
649 |
Configuring VRF-Aware Services |
650 |
User Interface for ARP |
651 |
User Interface for PING |
651 |
User Interface for SNMP |
651 |
User Interface for HSRP |
651 |
User Interface for Syslog |
652 |
User Interface for Traceroute |
652 |
User Interface for FTP and TFTP |
652 |
Configuring a VPN Routing Session |
653 |
Configuring BGP PE to CE Routing Sessions |
654 |
Multi-VRF CE Configuration Example |
654 |
Displaying Multi-VRF CE Status |
658 |
Configuring Protocol-Independent Features |
659 |
Configuring Cisco Express Forwarding |
659 |
Configuring the Number of Equal-Cost Routing Paths |
660 |
Configuring Static Unicast Routes |
661 |
Specifying Default Routes and Networks |
662 |
Using Route Maps to Redistribute Routing Information |
663 |
Filtering Routing Information |
666 |
Setting Passive Interfaces |
667 |
Controlling Advertising and Processing in Routing Updates |
667 |
Filtering Sources of Routing Information |
668 |
Managing Authentication Keys |
669 |
Monitoring and Maintaining the IP Network |
670 |
Configuring HSRP |
671 |
Understanding HSRP |
671 |
HSRP Versions |
673 |
Multiple HSRP |
674 |
Configuring HSRP |
675 |
Default HSRP Configuration |
675 |
HSRP Configuration Guidelines |
675 |
Enabling HSRP |
676 |
Configuring HSRP Priority |
677 |
Configuring MHSRP |
679 |
Configuring HSRP Authentication and Timers |
680 |
Enabling HSRP Support for ICMP Redirect Messages |
681 |
Displaying HSRP Configurations |
681 |
Configuring Cisco IOS IP SLAs Operations |
683 |
Understanding Cisco IOS IP SLAs |
683 |
Using Cisco IOS IP SLAs to Measure Network Performance |
684 |
IP SLAs Responder and IP SLAs Control Protocol |
685 |
Response Time Computation for IP SLAs |
686 |
IP SLAs Operation Scheduling |
687 |
IP SLAs Operation Threshold Monitoring |
687 |
Configuring IP SLAs Operations |
688 |
Default Configuration |
688 |
Configuration Guidelines |
688 |
Configuring the IP SLAs Responder |
689 |
Analyzing IP Service Levels by Using the UDP Jitter Operation |
690 |
Analyzing IP Service Levels by Using the ICMP Echo Operation |
692 |
Monitoring IP SLAs Operations |
694 |
Configuring Ethernet OAM, CFM, and E-LMI |
697 |
Understanding Ethernet CFM |
697 |
CFM Domain |
698 |
Maintenance Associations and Maintenance Points |
699 |
CFM Messages |
700 |
Crosscheck Function and Static Remote MEPs |
701 |
SNMP Traps and Fault Alarms |
701 |
Configuration Error List |
701 |
IP SLAs Support for CFM |
702 |
Configuring Ethernet CFM |
702 |
Default Ethernet CFM Configuration |
702 |
Ethernet CFM Configuration Guidelines |
703 |
Configuring the CFM Domain |
703 |
Configuring Ethernet CFM Crosscheck |
706 |
Configuring Static Remote MEP |
707 |
Configuring a Port MEP |
709 |
Configuring SNMP Traps |
710 |
Configuring Fault Alarms |
711 |
Configuring IP SLAs CFM Operation |
712 |
Manually Configuring an IP SLAs CFM Probe or Jitter Operation |
712 |
Configuring an IP SLAs Operation with Endpoint Discovery |
714 |
Managing and Displaying Ethernet CFM Information |
716 |
Understanding the Ethernet OAM Protocol |
718 |
OAM Features |
719 |
OAM Messages |
719 |
Setting Up and Configuring Ethernet OAM |
720 |
Default Ethernet OAM Configuration |
720 |
Ethernet OAM Configuration Guidelines |
720 |
Enabling Ethernet OAM on an Interface |
720 |
Enabling Ethernet OAM Remote Loopback |
721 |
Configuring Ethernet OAM Link Monitoring |
722 |
Configuring Ethernet OAM Remote Failure Indications |
725 |
Configuring Ethernet OAM Templates |
725 |
Displaying Ethernet OAM Protocol Information |
728 |
Understanding E-LMI |
728 |
Configuring E-LMI |
729 |
Default E-LMI Configuration |
729 |
E-LMI Configuration Guidelines |
729 |
Enabling E-LMI |
730 |
Customer-Edge Device Configuration |
731 |
Displaying E-LMI |
731 |
Ethernet CFM and Ethernet OAM Interaction |
731 |
Enabling Ethernet OAM |
732 |
Ethernet OAM and CFM Configuration Example |
732 |
Configuring IP Multicast Routing |
735 |
Understanding Cisco’s Implementation of IP Multicast Routing |
735 |
Understanding IGMP |
736 |
IGMP Version 1 |
737 |
IGMP Version 2 |
737 |
Understanding PIM |
737 |
PIM Versions |
737 |
PIM Modes |
738 |
PIM Stub Routing |
739 |
IGMP Helper |
739 |
Auto-RP |
740 |
Bootstrap Router |
740 |
Multicast Forwarding and Reverse Path Check |
741 |
Configuring IP Multicast Routing |
742 |
Default Multicast Routing Configuration |
742 |
Multicast Routing Configuration Guidelines |
743 |
PIMv1 and PIMv2 Interoperability |
743 |
Auto-RP and BSR Configuration Guidelines |
744 |
Configuring Basic Multicast Routing |
744 |
Configuring PIM Stub Routing |
746 |
PIM Stub Routing Configuration Guidelines |
746 |
Enabling PIM Stub Routing |
746 |
Configuring Source-Specific Multicast |
747 |
SSM Components Overview |
747 |
How SSM Differs from Internet Standard Multicast |
748 |
SSM IP Address Range |
748 |
SSM Operations |
748 |
IGMPv3 Host Signalling |
749 |
Configuration Guidelines |
749 |
Configuring SSM |
750 |
Monitoring SSM |
750 |
Configuring Source Specific Multicast Mapping |
750 |
Configuration Guidelines and Restrictions |
751 |
SSM Mapping Overview |
751 |
Configuring SSM Mapping |
753 |
Monitoring SSM Mapping |
755 |
Configuring a Rendezvous Point |
756 |
Manually Assigning an RP to Multicast Groups |
756 |
Configuring Auto-RP |
757 |
Configuring PIMv2 BSR |
761 |
Using Auto-RP and a BSR |
765 |
Monitoring the RP Mapping Information |
766 |
Troubleshooting PIMv1 and PIMv2 Interoperability Problems |
766 |
Configuring Advanced PIM Features |
767 |
Understanding PIM Shared Tree and Source Tree |
767 |
Delaying the Use of PIM Shortest-Path Tree |
768 |
Modifying the PIM Router-Query Message Interval |
769 |
Configuring Optional IGMP Features |
770 |
Default IGMP Configuration |
770 |
Configuring the Switch as a Member of a Group |
770 |
Controlling Access to IP Multicast Groups |
771 |
Changing the IGMP Version |
772 |
Modifying the IGMP Host-Query Message Interval |
773 |
Changing the IGMP Query Timeout for IGMPv2 |
773 |
Changing the Maximum Query Response Time for IGMPv2 |
774 |
Configuring the Switch as a Statically Connected Member |
775 |
Configuring Optional Multicast Routing Features |
775 |
Configuring sdr Listener Support |
775 |
Enabling sdr Listener Support |
776 |
Limiting How Long an sdr Cache Entry Exists |
776 |
Configuring an IP Multicast Boundary |
777 |
Monitoring and Maintaining IP Multicast Routing |
778 |
Clearing Caches, Tables, and Databases |
778 |
Displaying System and Network Statistics |
779 |
Monitoring IP Multicast Routing |
780 |
Configuring MPLS, MPLS VPN, MPLS OAM, and EoMPLS |
781 |
Understanding MPLS Services |
782 |
Understanding MPLS VPNs |
784 |
VPN Benefits |
784 |
Distribution of VPN Routing Information |
786 |
Configuring MPLS VPNs |
787 |
Default MPLS Configuration |
787 |
MPLS VPN Configuration Guidelines |
787 |
Enabling MPLS |
788 |
Defining VPNs |
789 |
Configuring BGP Routing Sessions |
790 |
Configuring Provider-Edge-to-Provider-Edge Routing Sessions |
790 |
IBGP Provider-Edge-to-Provider-Edge Configuration |
790 |
IBGP Provider-Edge-to-Provider-Edge Configuration |
791 |
Configuring Provider-Edge-to-Customer-Edge Routing Sessions |
791 |
BGP Provider-Edge-to-Customer-Edge Configuration |
791 |
OSPF Provider-Edge-to-Customer-Edge Configuration |
792 |
RIPv2 Provider-Edge-to-Customer-Edge Routing Sessions |
793 |
Configuring Static Route Provider-Edge-to-Customer-Edge Routing Sessions |
794 |
EIGRP Provider-Edge-to-Customer-Edge Configuration |
794 |
Packet Flow in an MPLS VPN |
795 |
Sample Configurations |
796 |
Understanding MPLS Traffic Engineering and Fast Reroute |
797 |
MPLS TE |
797 |
MPLS TE Fast Reroute |
798 |
MPLS TE Primary and Backup Autotunnel |
799 |
Configuring MPLS Traffic Engineering and Fast Reroute |
800 |
Default MPLS TE and Fast Reroute Configuration |
800 |
MPLS TE and Fast Reroute Configuration Guidelines |
800 |
Configuring MPLS TE |
800 |
Configuring an MPLS TE Tunnel |
801 |
Configuring the Routing Protocol for MPLS TE |
802 |
Configuring TE Fast Reroute |
802 |
Configuring a Protected Link to Use a Backup Tunnel |
804 |
Configuring Fast Reroute Failure Detection (Optional) |
804 |
Configuring Primary and Backup Autotunnels |
805 |
Understanding EoMPLS |
806 |
Interaction with Other Features |
807 |
EoMPLS and IEEE 802.1Q Tunneling |
807 |
EoMPLS and Layer 2 Tunneling |
808 |
EoMPLS and Q in Q |
809 |
EoMPLS and QoS |
810 |
EoMPLS Limitations |
810 |
Enabling EoMPLS |
810 |
Default EoMPLS Configuration |
811 |
EoMPLS Configuration Guidelines |
811 |
Configuring EoMPLS |
811 |
Configuring the Pseudowire Using Pseudowire Class |
813 |
Configuring L2VPN Interworking |
814 |
EoMPLS and EVC |
815 |
Packet Flow in an EoMPLS Network |
816 |
Configuring L2VPN Pseudowire Redundancy |
817 |
Configuration Guidelines |
818 |
Configuring Pseudowire Redundancy |
819 |
Forcing a Manual Switchover to the Backup Pseudowire VC |
820 |
Monitoring L2VPN Pseudowire Redundancy |
820 |
Support for H-VPLS |
821 |
Understanding MPLS OAM |
822 |
LSP Ping |
823 |
LSP Traceroute |
824 |
AToM VCCV (LSP Ping over Pseudowire) |
824 |
IP SLAs Interworking with MPLS OAM |
824 |
LSP Tree Trace and IP SLAs ECMP Tree Trace |
825 |
Configuring MPLS OAM and IP SLAs MPLS |
825 |
Default MPLS OAM Configuration |
825 |
MPLS OAM Configuration Guidelines |
826 |
Using LSP Ping for LDP IPv4 FEC |
826 |
Using LSP Traceroute for LDP IPv4 FEC |
828 |
Using LSP Ping for Pseudowire (AToM VCCV) |
829 |
Configuring IP SLAs MPLS Ping and Traceroute |
830 |
Configuring the IP SLAs LSP Health Monitor |
831 |
Manually Configuring IP SLAs MPLS LSP Ping or Traceroute |
834 |
Using LSP Tree Trace |
836 |
Manually Setting LSP Tree Trace |
836 |
Configuring ECMP IP SLAs Tree Trace |
837 |
Monitoring and Maintaining MPLS and EoMPLS |
840 |
Troubleshooting |
843 |
Recovering from a Lost or Forgotten Password |
844 |
Procedure with Password Recovery Enabled |
845 |
Procedure with Password Recovery Disabled |
847 |
Preventing Autonegotiation Mismatches |
848 |
SFP Module Security and Identification |
849 |
Monitoring SFP Module Status |
849 |
Monitoring Temperature |
849 |
Using Ping |
850 |
Using Layer 2 Traceroute |
850 |
Understanding Layer 2 Traceroute |
851 |
Layer 2 Traceroute Usage Guidelines |
851 |
Displaying the Physical Path |
852 |
Using IP Traceroute |
852 |
Understanding IP Traceroute |
852 |
Executing IP Traceroute |
853 |
Using TDR |
854 |
Understanding TDR |
854 |
Running TDR and Displaying the Results |
854 |
Using Debug Commands |
854 |
Enabling Debugging on a Specific Feature |
855 |
Enabling All-System Diagnostics |
855 |
Redirecting Debug and Error Message Output |
856 |
Using the crashinfo File |
856 |
Using On-Board Failure Logging |
857 |
Understanding OBFL |
857 |
Configuring OBFL |
857 |
Displaying OBFL Information |
858 |
Configuring Online Diagnostics |
861 |
Understanding Online Diagnostics |
861 |
Configuring Online Diagnostics |
862 |
Running Online Diagnostic Tests |
863 |
Starting Online Diagnostic Tests |
863 |
Displaying Online Diagnostic Tests and Results |
864 |
Supported MIBs |
867 |
MIB List |
867 |
Using FTP to Access the MIB Files |
868 |
Working with the Cisco IOS File System, Configuration Files, and Software Images |
871 |
Working with the Flash File System |
871 |
Displaying Available File Systems |
872 |
Setting the Default File System |
873 |
Displaying Information about Files on a File System |
873 |
Changing Directories and Displaying the Working Directory |
873 |
Creating and Removing Directories |
874 |
Copying Files |
874 |
Deleting Files |
875 |
Creating, Displaying, and Extracting tar Files |
876 |
Creating a tar File |
876 |
Displaying the Contents of a tar File |
876 |
Extracting a tar File |
877 |
Displaying the Contents of a File |
878 |
Working with Configuration Files |
878 |
Guidelines for Creating and Using Configuration Files |
879 |
Configuration File Types and Location |
879 |
Creating a Configuration File By Using a Text Editor |
880 |
Copying Configuration Files By Using TFTP |
880 |
Preparing to Download or Upload a Configuration File By Using TFTP |
880 |
Downloading the Configuration File By Using TFTP |
881 |
Uploading the Configuration File By Using TFTP |
881 |
Copying Configuration Files By Using FTP |
882 |
Preparing to Download or Upload a Configuration File By Using FTP |
883 |
Downloading a Configuration File By Using FTP |
883 |
Uploading a Configuration File By Using FTP |
884 |
Copying Configuration Files By Using RCP |
885 |
Preparing to Download or Upload a Configuration File By Using RCP |
886 |
Downloading a Configuration File By Using RCP |
887 |
Uploading a Configuration File By Using RCP |
888 |
Clearing Configuration Information |
888 |
Clearing the Startup Configuration File |
889 |
Deleting a Stored Configuration File |
889 |
Replacing and Rolling Back Configurations |
889 |
Understanding Configuration Replacement and Rollback |
889 |
Configuration Replacement and Rollback Guidelines |
890 |
Configuring the Configuration Archive |
891 |
Performing a Configuration Replacement or Rollback Operation |
892 |
Working with Software Images |
893 |
Image Location on the Switch |
893 |
tar File Format of Images on a Server or Cisco.com |
894 |
Copying Image Files By Using TFTP |
894 |
Preparing to Download or Upload an Image File By Using TFTP |
895 |
Downloading an Image File By Using TFTP |
896 |
Uploading an Image File By Using TFTP |
897 |
Copying Image Files By Using FTP |
897 |
Preparing to Download or Upload an Image File By Using FTP |
898 |
Downloading an Image File By Using FTP |
899 |
Uploading an Image File By Using FTP |
901 |
Copying Image Files By Using RCP |
902 |
Preparing to Download or Upload an Image File By Using RCP |
902 |
Downloading an Image File By Using RCP |
903 |
Uploading an Image File By Using RCP |
905 |
Unsupported Commands in Cisco IOS Release 12.2(52)EY |
907 |
Access Control List Commands |
908 |
Privileged EXEC Mode |
908 |
Global Configuration Mode |
908 |
Address Resolution Protocol (ARP) Commands |
908 |
Global Configuration Mode |
908 |
Interface Configuration Mode |
908 |
Hot Standby Routing Protocol (HSRP) Commands |
908 |
Global Configuration Mode |
908 |
IGMP Snooping Commands |
909 |
Global Configuration Mode |
909 |
IP Multicast Routing Commands |
909 |
Privileged EXEC Mode |
909 |
Global Configuration Mode |
909 |
Interface Configuration Mode |
909 |
IP Unicast Routing Commands |
910 |
Privileged EXEC or User EXEC Mode |
910 |
Global Configuration Mode |
910 |
Interface Configuration Mode |
911 |
BGP Router Configuration Mode |
911 |
Route Map Configuration Mode |
911 |
VPN Configuration Mode |
911 |
Multiprotocol Label Switching (MPLS) Commands |
912 |
Privileged EXEC or User EXEC Mode |
912 |
Global Configuration Mode |
912 |
Interface Configuration Mode |
912 |
Physical Interfaces |
912 |
Tunnel Interfaces |
912 |
Routing Configuration Mode |
913 |
Multicast Source Discovery Protocol (MSDP) Commands |
913 |
Privileged EXEC Mode |
913 |
Global Configuration Mode |
913 |
NetFlow Commands |
913 |
Global Configuration Mode |
913 |
Quality of Service (QoS) Commands |
913 |
Global Configuration Mode |
913 |
Interface Configuration Mode |
914 |
RADIUS Commands |
914 |
Global Configuration Mode |
914 |
Simple Network Management Protocol (SNMP) Commands |
914 |
Global Configuration Mode |
914 |
Spanning Tree Commands |
914 |
Global Configuration Mode |
914 |
Interface Configuration Mode |
914 |
VLAN Commands |
915 |
Global Configuration Mode |
915 |
Global Configuration Mode |
915 |
VLAN Configuration Mode |
915 |
Other Unsupported Commands |
915 |
Privileged EXEC and User EXEC Mode |
915 |
Clear Commands |
915 |
Debug Commands |
915 |
Show Commands |
916 |
Global Configuration Mode |
916 |
Interface Configuration Mode |
916 |