Section |
Page |
Cisco IE 3000 Switch Software Configuration Guide |
1 |
Contents |
3 |
Preface |
33 |
Overview |
37 |
Features |
37 |
Ease-of-Deployment and Ease-of-Use Features |
38 |
Performance Features |
39 |
Management Options |
40 |
Manageability Features |
41 |
Availability and Redundancy Features |
42 |
VLAN Features |
43 |
Security Features |
44 |
QoS and CoS Features |
45 |
Monitoring Features |
46 |
Default Settings After Initial Switch Configuration |
47 |
Network Configuration Examples |
49 |
Design Concepts for Using the Switch |
49 |
Ethernet-to-the-Factory Architecture |
50 |
Enterprise Zone |
51 |
Demilitarized Zone |
51 |
Manufacturing Zone |
51 |
Topology Options |
53 |
Where to Go Next |
56 |
Using the Command-Line Interface |
57 |
Understanding Command Modes |
57 |
Understanding the Help System |
59 |
Understanding Abbreviated Commands |
60 |
Understanding no and default Forms of Commands |
60 |
Understanding CLI Error Messages |
61 |
Using Configuration Logging |
61 |
Using Command History |
62 |
Changing the Command History Buffer Size |
62 |
Recalling Commands |
62 |
Disabling the Command History Feature |
63 |
Using Editing Features |
63 |
Enabling and Disabling Editing Features |
63 |
Editing Commands through Keystrokes |
63 |
Editing Command Lines that Wrap |
65 |
Searching and Filtering Output of show and more Commands |
66 |
Accessing the CLI |
66 |
Accessing the CLI through a Console Connection or through Telnet |
66 |
Configuring Cisco IE 3000 Switch Alarms |
67 |
Understanding IE 3000 Switch Alarms |
67 |
Global Status Monitoring Alarms |
68 |
FCS Error Hysteresis Threshold |
68 |
Port Status Monitoring Alarms |
68 |
Triggering Alarm Options |
69 |
Configuring IE 3000 Switch Alarms |
70 |
Default IE 3000 Switch Alarm Configuration |
70 |
Configuring the Power Supply Alarm |
71 |
Setting the Power Mode |
71 |
Setting the Power Supply Alarm Options |
71 |
Configuring the Switch Temperature Alarms |
72 |
Setting the Primary Temperature Threshold for the Switch |
72 |
Setting a Secondary Temperature Threshold for the Switch |
73 |
Associating the Temperature Alarms to a Relay |
73 |
Configuring the FCS Bit Error Rate Alarm |
74 |
Setting the FCS Error Threshold |
74 |
Setting the FCS Error Hysteresis Threshold |
75 |
Configuring Alarm Profiles |
75 |
Creating or Modifying an Alarm Profile |
76 |
Attaching an Alarm Profile to a Specific Port |
77 |
Enabling SNMP Traps |
77 |
Displaying IE 3000 Switch Alarms Status |
78 |
Assigning the Switch IP Address and Default Gateway |
79 |
Understanding the Boot Process |
79 |
Assigning Switch Information |
80 |
Default Switch Information |
81 |
Understanding DHCP-Based Autoconfiguration |
81 |
DHCP Client Request Process |
82 |
Understanding DHCP-based Autoconfiguration and Image Update |
83 |
DHCP Autoconfiguration |
83 |
DHCP Auto-Image Update |
83 |
Limitations and Restrictions |
83 |
Configuring DHCP-Based Autoconfiguration |
84 |
DHCP Server Configuration Guidelines |
84 |
Configuring the TFTP Server |
85 |
Configuring the DNS |
85 |
Configuring the Relay Device |
86 |
Obtaining Configuration Files |
86 |
Example Configuration |
87 |
Configuring the DHCP Auto Configuration and Image Update Features |
89 |
Configuring DHCP Autoconfiguration (Only Configuration File) |
89 |
Configuring DHCP Auto-Image Update (Configuration File and Image) |
90 |
Configuring the Client |
91 |
Manually Assigning IP Information |
92 |
Checking and Saving the Running Configuration |
92 |
Modifying the Startup Configuration |
93 |
Default Boot Configuration |
94 |
Automatically Downloading a Configuration File |
94 |
Specifying the Filename to Read and Write the System Configuration |
94 |
Booting Manually |
95 |
Booting a Specific Software Image |
96 |
Controlling Environment Variables |
96 |
Scheduling a Reload of the Software Image |
98 |
Configuring a Scheduled Reload |
98 |
Displaying Scheduled Reload Information |
99 |
Configuring Cisco EnergyWise |
101 |
Managing Single Entities |
101 |
EnergyWise Entity |
101 |
EnergyWise Domain |
102 |
EnergyWise Network |
102 |
Single PoE Switch Scenario |
103 |
EnergyWise Power Level |
104 |
EnergyWise Importance |
105 |
EnergyWise Names, Roles, and Keywords |
105 |
Configuration Guidelines |
105 |
PoE and EnergyWise Interactions |
105 |
Manually Managing Power |
106 |
Powering the Entity |
106 |
Configuring Entity Attributes |
107 |
Powering the PoE Port |
108 |
Configuring PoE-Port Attributes |
108 |
Automatically Managing Power (Recurrence) |
109 |
Examples |
111 |
Setting Up the Domain |
111 |
Manually Managing Power |
112 |
Automatically Managing Power |
112 |
Managing Multiple Entities |
112 |
Multiple PoE Switch Scenario |
113 |
EnergyWise Query |
113 |
Using Queries to Manage Power in the Domain |
114 |
Examples |
115 |
Querying with the Name Attribute |
115 |
Querying with Keywords |
116 |
Querying to Set Power Levels |
116 |
Troubleshooting EnergyWise |
116 |
Using CLI Commands |
117 |
Verifying the Power Usage |
117 |
Additional Information |
118 |
Managing Power in a LAN |
118 |
Managing Power with IP Routing |
118 |
Configuring Cisco IOS Configuration Engine |
121 |
Understanding Cisco Configuration Engine Software |
121 |
Configuration Service |
122 |
Event Service |
123 |
NameSpace Mapper |
123 |
What You Should Know About the CNS IDs and Device Hostnames |
123 |
ConfigID |
123 |
DeviceID |
124 |
Hostname and DeviceID |
124 |
Using Hostname, DeviceID, and ConfigID |
124 |
Understanding Cisco IOS Agents |
125 |
Initial Configuration |
125 |
Incremental (Partial) Configuration |
126 |
Synchronized Configuration |
126 |
Configuring Cisco IOS Agents |
126 |
Enabling Automated CNS Configuration |
126 |
Enabling the CNS Event Agent |
127 |
Enabling the Cisco IOS CNS Agent |
129 |
Enabling an Initial Configuration |
129 |
Enabling a Partial Configuration |
133 |
Displaying CNS Configuration |
134 |
Clustering Switches |
135 |
Understanding Switch Clusters |
135 |
Cluster Command Switch Characteristics |
137 |
Standby Cluster Command Switch Characteristics |
137 |
Candidate Switch and Cluster Member Switch Characteristics |
137 |
Planning a Switch Cluster |
138 |
Automatic Discovery of Cluster Candidates and Members |
138 |
Discovery Through CDP Hops |
139 |
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices |
140 |
Discovery Through Different VLANs |
140 |
Discovery Through Different Management VLANs |
141 |
Discovery of Newly Installed Switches |
142 |
HSRP and Standby Cluster Command Switches |
143 |
Virtual IP Addresses |
144 |
Other Considerations for Cluster Standby Groups |
144 |
Automatic Recovery of Cluster Configuration |
145 |
IP Addresses |
146 |
Hostnames |
146 |
Passwords |
146 |
SNMP Community Strings |
147 |
TACACS+ and RADIUS |
147 |
LRE Profiles |
147 |
Using the CLI to Manage Switch Clusters |
148 |
Catalyst 1900 and Catalyst 2820 CLI Considerations |
148 |
Using SNMP to Manage Switch Clusters |
148 |
Administering the Switch |
151 |
Managing the System Time and Date |
151 |
Understanding the System Clock |
151 |
Understanding Network Time Protocol |
152 |
Configuring NTP |
153 |
Default NTP Configuration |
154 |
Configuring NTP Authentication |
154 |
Configuring NTP Associations |
155 |
Configuring NTP Broadcast Service |
156 |
Configuring NTP Access Restrictions |
158 |
Configuring the Source IP Address for NTP Packets |
160 |
Displaying the NTP Configuration |
161 |
Configuring Time and Date Manually |
161 |
Setting the System Clock |
161 |
Displaying the Time and Date Configuration |
162 |
Configuring the Time Zone |
162 |
Configuring Summer Time (Daylight Saving Time) |
163 |
Configuring a System Name and Prompt |
164 |
Default System Name and Prompt Configuration |
165 |
Configuring a System Name |
165 |
Understanding DNS |
165 |
Default DNS Configuration |
166 |
Setting Up DNS |
166 |
Displaying the DNS Configuration |
167 |
Creating a Banner |
167 |
Default Banner Configuration |
167 |
Configuring a Message-of-the-Day Login Banner |
168 |
Configuring a Login Banner |
168 |
Managing the MAC Address Table |
169 |
Building the Address Table |
170 |
MAC Addresses and VLANs |
170 |
Default MAC Address Table Configuration |
170 |
Changing the Address Aging Time |
171 |
Removing Dynamic Address Entries |
171 |
Configuring MAC Address Notification Traps |
171 |
Adding and Removing Static Address Entries |
173 |
Configuring Unicast MAC Address Filtering |
174 |
Disabling MAC Address Learning on a VLAN |
175 |
Displaying Address Table Entries |
177 |
Managing the ARP Table |
177 |
Configuring PTP |
179 |
Understanding PTP |
179 |
Configuring PTP |
179 |
Default Configuration |
180 |
Setting Up PTP |
181 |
Displaying the PTP Configuration |
182 |
Configuring SDM Templates |
183 |
Understanding the SDM Templates |
183 |
Configuring the Switch SDM Template |
184 |
Default SDM Template |
184 |
SDM Template Configuration Guidelines |
184 |
Setting the SDM Template |
185 |
.Displaying the SDM Templates |
185 |
Configuring Switch-Based Authentication |
187 |
Preventing Unauthorized Access to Your Switch |
187 |
Protecting Access to Privileged EXEC Commands |
188 |
Default Password and Privilege Level Configuration |
188 |
Setting or Changing a Static Enable Password |
189 |
Protecting Enable and Enable Secret Passwords with Encryption |
189 |
Disabling Password Recovery |
191 |
Setting a Telnet Password for a Terminal Line |
192 |
Configuring Username and Password Pairs |
192 |
Configuring Multiple Privilege Levels |
193 |
Setting the Privilege Level for a Command |
194 |
Changing the Default Privilege Level for Lines |
195 |
Logging into and Exiting a Privilege Level |
195 |
Controlling Switch Access with TACACS+ |
196 |
Understanding TACACS+ |
196 |
TACACS+ Operation |
198 |
Configuring TACACS+ |
198 |
Default TACACS+ Configuration |
199 |
Identifying the TACACS+ Server Host and Setting the Authentication Key |
199 |
Configuring TACACS+ Login Authentication |
200 |
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services |
202 |
Starting TACACS+ Accounting |
203 |
Displaying the TACACS+ Configuration |
203 |
Controlling Switch Access with RADIUS |
203 |
Understanding RADIUS |
204 |
RADIUS Operation |
205 |
Configuring RADIUS |
205 |
Default RADIUS Configuration |
206 |
Identifying the RADIUS Server Host |
206 |
Configuring RADIUS Login Authentication |
209 |
Defining AAA Server Groups |
211 |
Configuring RADIUS Authorization for User Privileged Access and Network Services |
213 |
Starting RADIUS Accounting |
214 |
Configuring Settings for All RADIUS Servers |
215 |
Configuring the Switch to Use Vendor-Specific RADIUS Attributes |
215 |
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication |
217 |
Configuring RADIUS Server Load Balancing |
217 |
Displaying the RADIUS Configuration |
218 |
Configuring the Switch for Local Authentication and Authorization |
218 |
Configuring the Switch for Secure Shell |
219 |
Understanding SSH |
219 |
SSH Servers, Integrated Clients, and Supported Versions |
219 |
Limitations |
220 |
Configuring SSH |
220 |
Configuration Guidelines |
220 |
Setting Up the Switch to Run SSH |
221 |
Configuring the SSH Server |
222 |
Displaying the SSH Configuration and Status |
223 |
Configuring the Switch for Secure Socket Layer HTTP |
223 |
Understanding Secure HTTP Servers and Clients |
223 |
Certificate Authority Trustpoints |
224 |
CipherSuites |
225 |
Configuring Secure HTTP Servers and Clients |
226 |
Default SSL Configuration |
226 |
SSL Configuration Guidelines |
226 |
Configuring a CA Trustpoint |
226 |
Configuring the Secure HTTP Server |
227 |
Configuring the Secure HTTP Client |
229 |
Displaying Secure HTTP Server and Client Status |
229 |
Configuring the Switch for Secure Copy Protocol |
230 |
Information About Secure Copy |
230 |
Configuring IEEE 802.1x Port-Based Authentication |
231 |
Understanding IEEE 802.1x Port-Based Authentication |
231 |
Device Roles |
232 |
Authentication Process |
233 |
Authentication Initiation and Message Exchange |
235 |
Authentication Manager |
237 |
Port-Based Authentication Methods |
237 |
Per-User ACLs and Filter-Ids |
238 |
Authentication Manager CLI Commands |
238 |
Ports in Authorized and Unauthorized States |
239 |
802.1x Host Mode |
240 |
Multidomain Authentication |
241 |
802.1x Multiple Authentication Mode |
242 |
802.1x Accounting |
242 |
802.1x Accounting Attribute-Value Pairs |
243 |
802.1x Readiness Check |
244 |
802.1x Authentication with VLAN Assignment |
244 |
802.1x Authentication with Downloadable ACLs and Redirect URLs |
245 |
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL |
246 |
Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs |
246 |
802.1x Authentication with Guest VLAN |
247 |
802.1x Authentication with Restricted VLAN |
248 |
802.1x Authentication with Inaccessible Authentication Bypass |
249 |
802.1x Authentication with Voice VLAN Ports |
250 |
802.1x Authentication with Port Security |
250 |
802.1x Authentication with Wake-on-LAN |
251 |
802.1x Authentication with MAC Authentication Bypass |
252 |
Network Admission Control Layer 2 802.1x Validation |
253 |
Flexible Authentication Ordering |
253 |
Open1x Authentication |
254 |
802.1x Switch Supplicant with Network Edge Access Topology (NEAT) |
254 |
Web Authentication |
255 |
Web Authentication with Automatic MAC Check |
256 |
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute |
256 |
Configuring 802.1x Authentication |
256 |
Default 802.1x Authentication Configuration |
257 |
802.1x Authentication Configuration Guidelines |
258 |
802.1x Authentication |
259 |
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass |
259 |
MAC Authentication Bypass |
260 |
Maximum Number of Allowed Devices Per Port |
260 |
Configuring 802.1x Readiness Check |
261 |
Configuring 802.1x Violation Modes |
262 |
Configuring 802.1x Authentication |
262 |
Configuring the Switch-to-RADIUS-Server Communication |
264 |
Configuring the Host Mode |
265 |
Configuring Periodic Re-Authentication |
267 |
Manually Re-Authenticating a Client Connected to a Port |
268 |
Changing the Quiet Period |
268 |
Changing the Switch-to-Client Retransmission Time |
269 |
Setting the Switch-to-Client Frame-Retransmission Number |
269 |
Setting the Re-Authentication Number |
270 |
Configuring 802.1x Accounting |
271 |
Configuring a Guest VLAN |
272 |
Configuring a Restricted VLAN |
273 |
Configuring the Inaccessible Authentication Bypass Feature |
275 |
Configuring 802.1x Authentication with WoL |
277 |
Configuring MAC Authentication Bypass |
278 |
Configuring NAC Layer 2 802.1x Validation |
279 |
Configuring 802.1x Switch Supplicant with NEAT |
280 |
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs |
282 |
Configuring Downloadable ACLs |
282 |
Configuring a Downloadable Policy |
283 |
Configuring Flexible Authentication Ordering |
284 |
Configuring Open1x |
285 |
Configuring Web Authentication |
285 |
Disabling 802.1x Authentication on the Port |
288 |
Resetting the 802.1x Authentication Configuration to the Default Values |
289 |
Displaying 802.1x Statistics and Status |
289 |
Configuring Interface Characteristics |
291 |
Understanding Interface Types |
291 |
Port-Based VLANs |
292 |
Switch Ports |
292 |
Access Ports |
292 |
Trunk Ports |
293 |
EtherChannel Port Groups |
293 |
Dual-Purpose Uplink Ports |
294 |
Connecting Interfaces |
294 |
Using Interface Configuration Mode |
294 |
Procedures for Configuring Interfaces |
296 |
Configuring a Range of Interfaces |
296 |
Configuring and Using Interface Range Macros |
298 |
Configuring Ethernet Interfaces |
300 |
Default Ethernet Interface Configuration |
300 |
Setting the Type of a Dual-Purpose Uplink Port |
301 |
Configuring Interface Speed and Duplex Mode |
303 |
Speed and Duplex Configuration Guidelines |
303 |
Setting the Interface Speed and Duplex Parameters |
304 |
Configuring IEEE 802.3x Flow Control |
305 |
Configuring Auto-MDIX on an Interface |
306 |
Adding a Description for an Interface |
307 |
Configuring the System MTU |
307 |
Monitoring and Maintaining the Interfaces |
308 |
Monitoring Interface Status |
309 |
Clearing and Resetting Interfaces and Counters |
309 |
Shutting Down and Restarting the Interface |
310 |
Configuring Smartports Macros |
311 |
Understanding Smartports Macros |
311 |
Configuring Smartports Macros |
311 |
Default Smartports Configuration |
311 |
Smartports Configuration Guidelines |
312 |
Applying Smartports Macros |
313 |
Displaying Smartports Macros |
315 |
Configuring VLANs |
317 |
Understanding VLANs |
317 |
Supported VLANs |
318 |
VLAN Port Membership Modes |
319 |
Configuring Normal-Range VLANs |
320 |
Token Ring VLANs |
321 |
Normal-Range VLAN Configuration Guidelines |
321 |
VLAN Configuration Mode Options |
322 |
VLAN Configuration in config-vlan Mode |
322 |
VLAN Configuration in VLAN Database Configuration Mode |
322 |
Saving VLAN Configuration |
322 |
Default Ethernet VLAN Configuration |
323 |
Creating or Modifying an Ethernet VLAN |
324 |
Deleting a VLAN |
325 |
Assigning Static-Access Ports to a VLAN |
326 |
Configuring Extended-Range VLANs |
327 |
Default VLAN Configuration |
327 |
Extended-Range VLAN Configuration Guidelines |
328 |
Creating an Extended-Range VLAN |
328 |
Displaying VLANs |
329 |
Configuring VLAN Trunks |
330 |
Trunking Overview |
330 |
IEEE 802.1Q Configuration Considerations |
331 |
Default Layer 2 Ethernet Interface VLAN Configuration |
332 |
Configuring an Ethernet Interface as a Trunk Port |
332 |
Interaction with Other Features |
332 |
Configuring a Trunk Port |
333 |
Defining the Allowed VLANs on a Trunk |
334 |
Changing the Pruning-Eligible List |
335 |
Configuring the Native VLAN for Untagged Traffic |
335 |
Configuring Trunk Ports for Load Sharing |
336 |
Load Sharing Using STP Port Priorities |
336 |
Load Sharing Using STP Path Cost |
338 |
Configuring VMPS |
339 |
Understanding VMPS |
340 |
Dynamic-Access Port VLAN Membership |
340 |
Default VMPS Client Configuration |
341 |
VMPS Configuration Guidelines |
341 |
Configuring the VMPS Client |
341 |
Entering the IP Address of the VMPS |
342 |
Configuring Dynamic-Access Ports on VMPS Clients |
342 |
Reconfirming VLAN Memberships |
343 |
Changing the Reconfirmation Interval |
343 |
Changing the Retry Count |
344 |
Monitoring the VMPS |
344 |
Troubleshooting Dynamic-Access Port VLAN Membership |
345 |
VMPS Configuration Example |
345 |
Configuring VTP |
347 |
Understanding VTP |
347 |
The VTP Domain |
348 |
VTP Modes |
349 |
VTP Advertisements |
349 |
VTP Version 2 |
350 |
VTP Pruning |
350 |
Configuring VTP |
352 |
Default VTP Configuration |
352 |
VTP Configuration Options |
352 |
VTP Configuration in Global Configuration Mode |
353 |
VTP Configuration in VLAN Database Configuration Mode |
353 |
VTP Configuration Guidelines |
353 |
Domain Names |
353 |
Passwords |
354 |
VTP Version |
354 |
Configuration Requirements |
354 |
Configuring a VTP Server |
355 |
Configuring a VTP Client |
357 |
Disabling VTP (VTP Transparent Mode) |
358 |
Enabling VTP Version 2 |
359 |
Enabling VTP Pruning |
360 |
Adding a VTP Client Switch to a VTP Domain |
360 |
Monitoring VTP |
362 |
Configuring Voice VLAN |
363 |
Understanding Voice VLAN |
363 |
Cisco IP Phone Voice Traffic |
364 |
Cisco IP Phone Data Traffic |
364 |
Configuring Voice VLAN |
365 |
Default Voice VLAN Configuration |
365 |
Voice VLAN Configuration Guidelines |
365 |
Configuring a Port Connected to a Cisco 7960 IP Phone |
366 |
Configuring Cisco IP Phone Voice Traffic |
366 |
Configuring the Priority of Incoming Data Frames |
368 |
Displaying Voice VLAN |
368 |
Configuring STP |
369 |
Understanding Spanning-Tree Features |
369 |
STP Overview |
370 |
Spanning-Tree Topology and BPDUs |
371 |
Bridge ID, Switch Priority, and Extended System ID |
372 |
Spanning-Tree Interface States |
372 |
Blocking State |
373 |
Listening State |
374 |
Learning State |
374 |
Forwarding State |
374 |
Disabled State |
375 |
How a Switch or Port Becomes the Root Switch or Root Port |
375 |
Spanning Tree and Redundant Connectivity |
376 |
Spanning-Tree Address Management |
376 |
Accelerated Aging to Retain Connectivity |
376 |
Spanning-Tree Modes and Protocols |
377 |
Supported Spanning-Tree Instances |
377 |
Spanning-Tree Interoperability and Backward Compatibility |
378 |
STP and IEEE 802.1Q Trunks |
378 |
Configuring Spanning-Tree Features |
379 |
Default Spanning-Tree Configuration |
379 |
Spanning-Tree Configuration Guidelines |
380 |
Changing the Spanning-Tree Mode. |
381 |
Disabling Spanning Tree |
382 |
Configuring the Root Switch |
382 |
Configuring a Secondary Root Switch |
384 |
Configuring Port Priority |
384 |
Configuring Path Cost |
386 |
Configuring the Switch Priority of a VLAN |
387 |
Configuring Spanning-Tree Timers |
388 |
Configuring the Hello Time |
388 |
Configuring the Forwarding-Delay Time for a VLAN |
389 |
Configuring the Maximum-Aging Time for a VLAN |
389 |
Configuring the Transmit Hold-Count |
390 |
Displaying the Spanning-Tree Status |
390 |
Configuring MSTP |
391 |
Understanding MSTP |
392 |
Multiple Spanning-Tree Regions |
392 |
IST, CIST, and CST |
392 |
Operations Within an MST Region |
393 |
Operations Between MST Regions |
393 |
IEEE 802.1s Terminology |
395 |
Hop Count |
395 |
Boundary Ports |
396 |
IEEE 802.1s Implementation |
396 |
Port Role Naming Change |
396 |
Interoperation Between Legacy and Standard Switches |
397 |
Detecting Unidirectional Link Failure |
397 |
Interoperability with IEEE 802.1D STP |
398 |
Understanding RSTP |
398 |
Port Roles and the Active Topology |
399 |
Rapid Convergence |
399 |
Synchronization of Port Roles |
401 |
Bridge Protocol Data Unit Format and Processing |
402 |
Processing Superior BPDU Information |
402 |
Processing Inferior BPDU Information |
403 |
Topology Changes |
403 |
Configuring MSTP Features |
403 |
Default MSTP Configuration |
404 |
MSTP Configuration Guidelines |
404 |
Specifying the MST Region Configuration and Enabling MSTP |
405 |
Configuring the Root Switch |
407 |
Configuring a Secondary Root Switch |
408 |
Configuring Port Priority |
409 |
Configuring Path Cost |
410 |
Configuring the Switch Priority |
411 |
Configuring the Hello Time |
412 |
Configuring the Forwarding-Delay Time |
413 |
Configuring the Maximum-Aging Time |
413 |
Configuring the Maximum-Hop Count |
414 |
Specifying the Link Type to Ensure Rapid Transitions |
414 |
Designating the Neighbor Type |
415 |
Restarting the Protocol Migration Process |
415 |
Displaying the MST Configuration and Status |
416 |
Configuring Optional Spanning-Tree Features |
417 |
Understanding Optional Spanning-Tree Features |
417 |
Understanding Port Fast |
418 |
Understanding BPDU Guard |
418 |
Understanding BPDU Filtering |
419 |
Understanding UplinkFast |
419 |
Understanding BackboneFast |
421 |
Understanding EtherChannel Guard |
423 |
Understanding Root Guard |
424 |
Understanding Loop Guard |
425 |
Configuring Optional Spanning-Tree Features |
425 |
Default Optional Spanning-Tree Configuration |
425 |
Optional Spanning-Tree Configuration Guidelines |
426 |
Enabling Port Fast |
426 |
Enabling BPDU Guard |
427 |
Enabling BPDU Filtering |
428 |
Enabling UplinkFast for Use with Redundant Links |
429 |
Enabling BackboneFast |
429 |
Enabling EtherChannel Guard |
430 |
Enabling Root Guard |
431 |
Enabling Loop Guard |
431 |
Displaying the Spanning-Tree Status |
432 |
Configuring Resilient Ethernet Protocol |
433 |
Understanding REP |
433 |
Link Integrity |
435 |
Fast Convergence |
436 |
VLAN Load Balancing |
436 |
Spanning Tree Interaction |
438 |
REP Ports |
438 |
Configuring REP |
438 |
Default REP Configuration |
439 |
REP Configuration Guidelines |
439 |
Configuring the REP Administrative VLAN |
440 |
Configuring REP Interfaces |
441 |
Setting Manual Preemption for VLAN Load Balancing |
444 |
Configuring SNMP Traps for REP |
445 |
Monitoring REP |
445 |
Configuring Flex Links and the MAC Address-Table Move Update Feature |
447 |
Understanding Flex Links and the MAC Address-Table Move Update |
447 |
Flex Links |
447 |
VLAN Flex Link Load Balancing and Support |
448 |
Flex Link Multicast Fast Convergence |
449 |
Learning the Other Flex Link Port as the mrouter Port |
449 |
Generating IGMP Reports |
449 |
Leaking IGMP Reports |
450 |
Configuration Examples |
450 |
MAC Address-Table Move Update |
452 |
Configuring Flex Links and the MAC Address-Table Move Update |
453 |
Default Configuration |
454 |
Configuration Guidelines |
454 |
Configuring Flex Links |
455 |
Configuring VLAN Load Balancing on Flex Links |
457 |
Configuring the MAC Address-Table Move Update Feature |
458 |
Monitoring Flex Links and the MAC Address-Table Move Update |
460 |
Configuring DHCP Features and IP Source Guard |
461 |
Understanding DHCP Snooping |
461 |
DHCP Server |
462 |
DHCP Relay Agent |
462 |
DHCP Snooping |
462 |
Option-82 Data Insertion |
463 |
DHCP Snooping Binding Database |
465 |
Configuring DHCP Snooping |
466 |
Default DHCP Snooping Configuration |
466 |
DHCP Snooping Configuration Guidelines |
467 |
Configuring the DHCP Relay Agent |
468 |
Enabling DHCP Snooping and Option 82 |
469 |
Enabling the Cisco IOS DHCP Server Database |
470 |
Enabling the DHCP Snooping Binding Database Agent |
471 |
Displaying DHCP Snooping Information |
472 |
Understanding IP Source Guard |
472 |
Source IP Address Filtering |
473 |
Source IP and MAC Address Filtering |
473 |
Configuring IP Source Guard |
473 |
Default IP Source Guard Configuration |
473 |
IP Source Guard Configuration Guidelines |
473 |
Enabling IP Source Guard |
474 |
Displaying IP Source Guard Information |
475 |
Understanding DHCP Server Port-Based Address Allocation |
475 |
Configuring DHCP Server Port-Based Address Allocation |
476 |
Default Port-Based Address Allocation Configuration |
476 |
Port-Based Address Allocation Configuration Guidelines |
476 |
Enabling DHCP Server Port-Based Address Allocation |
477 |
Displaying DHCP Server Port-Based Address Allocation |
479 |
Configuring Dynamic ARP Inspection |
481 |
Understanding Dynamic ARP Inspection |
481 |
Interface Trust States and Network Security |
483 |
Rate Limiting of ARP Packets |
484 |
Relative Priority of ARP ACLs and DHCP Snooping Entries |
484 |
Logging of Dropped Packets |
484 |
Configuring Dynamic ARP Inspection |
485 |
Default Dynamic ARP Inspection Configuration |
485 |
Dynamic ARP Inspection Configuration Guidelines |
486 |
Configuring Dynamic ARP Inspection in DHCP Environments |
487 |
Configuring ARP ACLs for Non-DHCP Environments |
488 |
Limiting the Rate of Incoming ARP Packets |
490 |
Performing Validation Checks |
492 |
Configuring the Log Buffer |
493 |
Displaying Dynamic ARP Inspection Information |
494 |
Configuring IGMP Snooping and MVR |
497 |
Understanding IGMP Snooping |
497 |
IGMP Versions |
498 |
Joining a Multicast Group |
499 |
Leaving a Multicast Group |
501 |
Immediate Leave |
501 |
IGMP Configurable-Leave Timer |
501 |
IGMP Report Suppression |
502 |
Configuring IGMP Snooping |
502 |
Default IGMP Snooping Configuration |
502 |
Enabling or Disabling IGMP Snooping |
503 |
Setting the Snooping Method |
504 |
Configuring a Multicast Router Port |
505 |
Configuring a Host Statically to Join a Group |
505 |
Enabling IGMP Immediate Leave |
506 |
Configuring the IGMP Leave Timer |
506 |
Configuring TCN-Related Commands |
507 |
Controlling the Multicast Flooding Time After a TCN Event |
507 |
Recovering from Flood Mode |
508 |
Disabling Multicast Flooding During a TCN Event |
509 |
Configuring the IGMP Snooping Querier |
509 |
Disabling IGMP Report Suppression |
511 |
Displaying IGMP Snooping Information |
511 |
Understanding Multicast VLAN Registration |
512 |
Using MVR in a Multicast Television Application |
513 |
Configuring MVR |
515 |
Default MVR Configuration |
515 |
MVR Configuration Guidelines and Limitations |
515 |
Configuring MVR Global Parameters |
516 |
Configuring MVR Interfaces |
517 |
Displaying MVR Information |
519 |
Configuring IGMP Filtering and Throttling |
519 |
Default IGMP Filtering and Throttling Configuration |
520 |
Configuring IGMP Profiles |
520 |
Applying IGMP Profiles |
521 |
Setting the Maximum Number of IGMP Groups |
522 |
Configuring the IGMP Throttling Action |
523 |
Displaying IGMP Filtering and Throttling Configuration |
524 |
Configuring Port-Based Traffic Control |
525 |
Configuring Storm Control |
525 |
Understanding Storm Control |
525 |
Default Storm Control Configuration |
527 |
Configuring Storm Control and Threshold Levels |
527 |
Configuring Small-Frame Arrival Rate |
529 |
Configuring Protected Ports |
530 |
Default Protected Port Configuration |
530 |
Protected Port Configuration Guidelines |
531 |
Configuring a Protected Port |
531 |
Configuring Port Blocking |
531 |
Default Port Blocking Configuration |
531 |
Blocking Flooded Traffic on an Interface |
532 |
Configuring Port Security |
532 |
Understanding Port Security |
533 |
Secure MAC Addresses |
533 |
Security Violations |
534 |
Default Port Security Configuration |
535 |
Port Security Configuration Guidelines |
535 |
Enabling and Configuring Port Security |
536 |
Enabling and Configuring Port Security Aging |
541 |
Displaying Port-Based Traffic Control Settings |
543 |
Configuring LLDP, LLDP-MED, and Wired Location Service |
545 |
Understanding LLDP, LLDP-MED, and Wired Location Service |
545 |
LLDP |
545 |
LLDP-MED |
546 |
Wired Location Service |
547 |
Configuring LLDP, LLDP-MED, and Wired Location Service |
548 |
Default LLDP Configuration |
548 |
Configuration Guidelines |
549 |
Enabling LLDP |
549 |
Configuring LLDP Characteristics |
549 |
Configuring LLDP-MED TLVs |
550 |
Configuring Network-Policy TLV |
551 |
Configuring Location TLV and Wired Location Service |
553 |
Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service |
554 |
Configuring CDP |
557 |
Understanding CDP |
557 |
Configuring CDP |
558 |
Default CDP Configuration |
558 |
Configuring the CDP Characteristics |
558 |
Disabling and Enabling CDP |
559 |
Disabling and Enabling CDP on an Interface |
560 |
Monitoring and Maintaining CDP |
561 |
Configuring UDLD |
563 |
Understanding UDLD |
563 |
Modes of Operation |
563 |
Methods to Detect Unidirectional Links |
564 |
Configuring UDLD |
565 |
Default UDLD Configuration |
566 |
Configuration Guidelines |
566 |
Enabling UDLD Globally |
567 |
Enabling UDLD on an Interface |
567 |
Resetting an Interface Disabled by UDLD |
568 |
Displaying UDLD Status |
568 |
Configuring SPAN and RSPAN |
569 |
Understanding SPAN and RSPAN |
569 |
Local SPAN |
570 |
Remote SPAN |
570 |
SPAN and RSPAN Concepts and Terminology |
571 |
SPAN Sessions |
571 |
Monitored Traffic |
572 |
Source Ports |
573 |
Source VLANs |
574 |
VLAN Filtering |
574 |
Destination Port |
574 |
RSPAN VLAN |
575 |
SPAN and RSPAN Interaction with Other Features |
576 |
Configuring SPAN and RSPAN |
577 |
Default SPAN and RSPAN Configuration |
577 |
Configuring Local SPAN |
577 |
SPAN Configuration Guidelines |
578 |
Creating a Local SPAN Session |
578 |
Creating a Local SPAN Session and Configuring Incoming Traffic |
581 |
Specifying VLANs to Filter |
583 |
Configuring RSPAN |
584 |
RSPAN Configuration Guidelines |
584 |
Configuring a VLAN as an RSPAN VLAN |
585 |
Creating an RSPAN Source Session |
586 |
Creating an RSPAN Destination Session |
587 |
Creating an RSPAN Destination Session and Configuring Incoming Traffic |
588 |
Specifying VLANs to Filter |
590 |
Displaying SPAN and RSPAN Status |
591 |
Configuring RMON |
593 |
Understanding RMON |
593 |
Configuring RMON |
594 |
Default RMON Configuration |
595 |
Configuring RMON Alarms and Events |
595 |
Collecting Group History Statistics on an Interface |
597 |
Collecting Group Ethernet Statistics on an Interface |
597 |
Displaying RMON Status |
598 |
Configuring System Message Logging |
599 |
Understanding System Message Logging |
599 |
Configuring System Message Logging |
600 |
System Log Message Format |
600 |
Default System Message Logging Configuration |
601 |
Disabling Message Logging |
602 |
Setting the Message Display Destination Device |
603 |
Synchronizing Log Messages |
604 |
Enabling and Disabling Time Stamps on Log Messages |
605 |
Enabling and Disabling Sequence Numbers in Log Messages |
606 |
Defining the Message Severity Level |
606 |
Limiting Syslog Messages Sent to the History Table and to SNMP |
608 |
Enabling the Configuration-Change Logger |
608 |
Configuring UNIX Syslog Servers |
610 |
Logging Messages to a UNIX Syslog Daemon |
610 |
Configuring the UNIX System Logging Facility |
610 |
Displaying the Logging Configuration |
611 |
Configuring SNMP |
613 |
Understanding SNMP |
613 |
SNMP Versions |
614 |
SNMP Manager Functions |
615 |
SNMP Agent Functions |
615 |
SNMP Community Strings |
616 |
Using SNMP to Access MIB Variables |
616 |
SNMP Notifications |
617 |
SNMP ifIndex MIB Object Values |
617 |
Configuring SNMP |
618 |
Default SNMP Configuration |
618 |
SNMP Configuration Guidelines |
618 |
Disabling the SNMP Agent |
619 |
Configuring Community Strings |
620 |
Configuring SNMP Groups and Users |
621 |
Configuring SNMP Notifications |
623 |
Setting the CPU Threshold Notification Types and Values |
627 |
Setting the Agent Contact and Location Information |
628 |
Limiting TFTP Servers Used Through SNMP |
628 |
SNMP Examples |
629 |
Displaying SNMP Status |
630 |
Configuring Network Security with ACLs |
631 |
Understanding ACLs |
631 |
Port ACLs |
632 |
Handling Fragmented and Unfragmented Traffic |
633 |
Configuring IPv4 ACLs |
634 |
Creating Standard and Extended IPv4 ACLs |
635 |
Access List Numbers |
636 |
Creating a Numbered Standard ACL |
637 |
Creating a Numbered Extended ACL |
638 |
Resequencing ACEs in an ACL |
642 |
Creating Named Standard and Extended ACLs |
642 |
Using Time Ranges with ACLs |
644 |
Including Comments in ACLs |
645 |
Applying an IPv4 ACL to a Terminal Line |
646 |
Applying an IPv4 ACL to an Interface |
646 |
Hardware and Software Treatment of IP ACLs |
647 |
Troubleshooting ACLs |
647 |
IPv4 ACL Configuration Examples |
648 |
Numbered ACLs |
649 |
Extended ACLs |
649 |
Named ACLs |
649 |
Time Range Applied to an IP ACL |
650 |
Commented IP ACL Entries |
650 |
Creating Named MAC Extended ACLs |
650 |
Applying a MAC ACL to a Layer 2 Interface |
652 |
Displaying IPv4 ACL Configuration |
653 |
Configuring Cisco IOS IP SLAs Operations |
655 |
Understanding Cisco IOS IP SLAs |
655 |
Using Cisco IOS IP SLAs to Measure Network Performance |
656 |
IP SLAs Responder and IP SLAs Control Protocol |
657 |
Response Time Computation for IP SLAs |
658 |
Configuring IP SLAs Operations |
659 |
Default Configuration |
659 |
Configuration Guidelines |
659 |
Configuring the IP SLAs Responder |
660 |
Monitoring IP SLAs Operations |
660 |
Configuring QoS |
661 |
Understanding QoS |
661 |
Basic QoS Model |
663 |
Classification |
665 |
Classification Based on QoS ACLs |
667 |
Classification Based on Class Maps and Policy Maps |
667 |
Policing and Marking |
668 |
Policing on Physical Ports |
668 |
Mapping Tables |
670 |
Queueing and Scheduling Overview |
671 |
Weighted Tail Drop |
671 |
SRR Shaping and Sharing |
672 |
Queueing and Scheduling on Ingress Queues |
673 |
Queueing and Scheduling on Egress Queues |
675 |
Packet Modification |
678 |
Configuring Auto-QoS |
679 |
Generated Auto-QoS Configuration |
679 |
Effects of Auto-QoS on the Configuration |
684 |
Auto-QoS Configuration Guidelines |
684 |
Enabling Auto-QoS for VoIP |
685 |
Auto-QoS Configuration Example |
686 |
Displaying Auto-QoS Information |
687 |
Configuring Standard QoS |
688 |
Default Standard QoS Configuration |
688 |
Default Ingress Queue Configuration |
689 |
Default Egress Queue Configuration |
689 |
Default Mapping Table Configuration |
690 |
Standard QoS Configuration Guidelines |
691 |
QoS ACL Guidelines |
691 |
Policing Guidelines |
691 |
General QoS Guidelines |
692 |
Enabling QoS Globally |
692 |
Configuring Classification Using Port Trust States |
692 |
Configuring the Trust State on Ports within the QoS Domain |
693 |
Configuring the CoS Value for an Interface |
694 |
Configuring a Trusted Boundary to Ensure Port Security |
695 |
Enabling DSCP Transparency Mode |
696 |
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain |
697 |
Configuring a QoS Policy |
699 |
Classifying Traffic by Using ACLs |
699 |
Classifying Traffic by Using Class Maps |
702 |
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps |
704 |
Classifying, Policing, and Marking Traffic by Using Aggregate Policers |
708 |
Configuring DSCP Maps |
710 |
Configuring the CoS-to-DSCP Map |
711 |
Configuring the IP-Precedence-to-DSCP Map |
712 |
Configuring the Policed-DSCP Map |
713 |
Configuring the DSCP-to-CoS Map |
714 |
Configuring the DSCP-to-DSCP-Mutation Map |
715 |
Configuring Ingress Queue Characteristics |
716 |
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds |
717 |
Allocating Buffer Space Between the Ingress Queues |
718 |
Allocating Bandwidth Between the Ingress Queues |
719 |
Configuring the Ingress Priority Queue |
720 |
Configuring Egress Queue Characteristics |
721 |
Configuration Guidelines |
721 |
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set |
721 |
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID |
724 |
Configuring SRR Shaped Weights on Egress Queues |
725 |
Configuring SRR Shared Weights on Egress Queues |
726 |
Configuring the Egress Expedite Queue |
727 |
Limiting the Bandwidth on an Egress Interface |
727 |
Displaying Standard QoS Information |
728 |
Configuring IPv6 Host Functions |
731 |
Understanding IPv6 |
731 |
IPv6 Addresses |
732 |
Supported IPv6 Host Features |
732 |
128-Bit Wide Unicast Addresses |
733 |
DNS for IPv6 |
733 |
ICMPv6 |
733 |
Neighbor Discovery |
733 |
IPv6 Stateless Autoconfiguration and Duplicate Address Detection |
734 |
IPv6 Applications |
734 |
Dual IPv4 and IPv6 Protocol Stacks |
734 |
Static Routes for IPv6 |
735 |
SNMP and Syslog Over IPv6 |
735 |
HTTP(S) Over IPv6 |
736 |
Configuring IPv6 |
736 |
Default IPv6 Configuration |
736 |
Configuring IPv6 Addressing and Enabling IPv6 Host |
736 |
Configuring IPv6 ICMP Rate Limiting |
738 |
Configuring Static Routes for IPv6 |
739 |
Displaying IPv6 |
740 |
Configuring EtherChannels and Link-State Tracking |
743 |
Understanding EtherChannels |
743 |
EtherChannel Overview |
744 |
Port-Channel Interfaces |
745 |
Port Aggregation Protocol |
746 |
PAgP Modes |
746 |
PAgP Interaction with Virtual Switches and Dual-Active Detection |
747 |
PAgP Interaction with Other Features |
747 |
Link Aggregation Control Protocol |
747 |
LACP Modes |
748 |
LACP Interaction with Other Features |
748 |
EtherChannel On Mode |
748 |
Load Balancing and Forwarding Methods |
749 |
Configuring EtherChannels |
750 |
Default EtherChannel Configuration |
751 |
EtherChannel Configuration Guidelines |
751 |
Configuring Layer 2 EtherChannels |
752 |
Configuring EtherChannel Load Balancing |
755 |
Configuring the PAgP Learn Method and Priority |
756 |
Configuring LACP Hot-Standby Ports |
757 |
Configuring the LACP System Priority |
758 |
Configuring the LACP Port Priority |
758 |
Displaying EtherChannel, PAgP, and LACP Status |
759 |
Understanding Link-State Tracking |
760 |
Configuring Link-State Tracking |
762 |
Default Link-State Tracking Configuration |
762 |
Link-State Tracking Configuration Guidelines |
763 |
Configuring Link-State Tracking |
763 |
Displaying Link-State Tracking Status |
764 |
Troubleshooting |
765 |
Recovering from a Software Failure |
766 |
Recovering from a Lost or Forgotten Password |
767 |
Recovering from a Command Switch Failure |
768 |
Replacing a Failed Command Switch with a Cluster Member |
768 |
Replacing a Failed Command Switch with Another Switch |
770 |
Recovering from Lost Cluster Member Connectivity |
771 |
Preventing Autonegotiation Mismatches |
771 |
SFP Module Security and Identification |
772 |
Monitoring SFP Module Status |
772 |
Using Ping |
772 |
Understanding Ping |
773 |
Executing Ping |
773 |
Using Layer 2 Traceroute |
774 |
Understanding Layer 2 Traceroute |
774 |
Usage Guidelines |
774 |
Displaying the Physical Path |
775 |
Using IP Traceroute |
775 |
Understanding IP Traceroute |
775 |
Executing IP Traceroute |
776 |
Using TDR |
777 |
Understanding TDR |
777 |
Running TDR and Displaying the Results |
778 |
Using Debug Commands |
778 |
Enabling Debugging on a Specific Feature |
778 |
Enabling All-System Diagnostics |
779 |
Redirecting Debug and Error Message Output |
779 |
Using the show platform forward Command |
780 |
Using the crashinfo Files |
781 |
Basic crashinfo Files |
781 |
Extended crashinfo Files |
782 |
Troubleshooting Tables |
782 |
Troubleshooting CPU Utilization |
782 |
Possible Symptoms of High CPU Utilization |
782 |
Verifying the Problem and Cause |
783 |
Supported MIBs |
785 |
MIB List |
785 |
Using FTP to Access the MIB Files |
787 |
Working with the Cisco IOS File System, Configuration Files, and Software Images |
789 |
Working with the Flash File System |
789 |
Displaying Available File Systems |
790 |
Setting the Default File System |
790 |
Displaying Information about Files on a File System |
791 |
Changing Directories and Displaying the Working Directory |
792 |
Creating and Removing Directories |
792 |
Copying Files |
793 |
Deleting Files |
793 |
Creating, Displaying, and Extracting tar Files |
794 |
Creating a tar File |
794 |
Displaying the Contents of a tar File |
794 |
Extracting a tar File |
795 |
Displaying the Contents of a File |
796 |
Working with Configuration Files |
796 |
Guidelines for Creating and Using Configuration Files |
797 |
Configuration File Types and Location n |
797 |
Creating a Configuration File By Using a Text Editor |
798 |
Copying Configuration Files By Using TFTP |
798 |
Preparing to Download or Upload a Configuration File B y Using TFTP |
798 |
Downloading the Configuration File By Using TFTP |
799 |
Uploading the Configuration File By Using TFTP |
799 |
Copying Configuration Files By Using FTP |
800 |
Preparing to Download or Upload a Configuration File By Using FTP |
801 |
Downloading a Configuration File By Using FTP |
801 |
Uploading a Configuration File By Using FTP |
802 |
Copying Configuration Files By Using RCP |
803 |
Preparing to Download or Upload a Configuration File By Using RCP |
804 |
Downloading a Configuration File By Using RCP |
805 |
Uploading a Configuration File By Using RCP |
806 |
Clearing Configuration Information |
806 |
Clearing the Startup Configuration File |
807 |
Deleting a Stored Configuration File |
807 |
Replacing and Rolling Back Configurations |
807 |
Understanding Configuration Replacement and Rollback |
807 |
Configuration Guidelines |
809 |
Configuring the Configuration Archive |
809 |
Performing a Configuration Replacement or Rollback Operation |
810 |
Working with Software Images |
811 |
Image Location on the Switch |
812 |
tar File Format of Images on a Server or Cisco.com |
812 |
Copying Image Files By Using TFTP |
813 |
Preparing to Download or Upload an Image File By Using TFTP |
813 |
Downloading an Image File By Using TFTP |
814 |
Uploading an Image File By Using TFTP |
816 |
Copying Image Files By Using FTP |
816 |
Preparing to Download or Upload an Image File By Using FTP |
817 |
Downloading an Image File By Using FTP |
818 |
Uploading an Image File By Using FTP |
819 |
Copying Image Files By Using RCP |
820 |
Preparing to Download or Upload an Image File By Using RCP |
821 |
Downloading an Image File By Using RCP |
822 |
Uploading an Image File By Using RCP |
824 |
Unsupported Commands in Cisco IOS Release 12.2(50)SE |
827 |
Access Control Lists |
827 |
Unsupported Privileged EXEC Commands |
827 |
Unsupported Global Configuration Commands |
828 |
Unsupported Route-Map Configuration Commands |
828 |
Boot Loader Commands |
828 |
Unsupported Global Configuration Commands |
828 |
Debug Commands |
828 |
Unsupported Privileged EXEC Commands |
828 |
|IGMP Snooping Commands |
828 |
Unsupported Global Configuration Commands |
828 |
Interface Commands |
829 |
Unsupported Privileged EXEC Commands |
829 |
Unsupported Global Configuration Commands |
829 |
Unsupported Interface Configuration Commands |
829 |
MAC Address Commands |
829 |
Unsupported Privileged EXEC Commands |
829 |
Unsupported Global Configuration Commands |
830 |
Miscellaneous |
830 |
Unsupported User EXEC Commands |
830 |
Unsupported Privileged EXEC Commands |
830 |
Unsupported Global Configuration Commands |
830 |
Network Address Translation (NAT) Commands |
830 |
Unsupported Privileged EXEC Commands |
830 |
QoS |
830 |
Unsupported Global Configuration Command |
830 |
Unsupported Interface Configuration Commands |
831 |
Unsupported Policy-Map Configuration Command |
831 |
RADIUS |
831 |
Unsupported Global Configuration Commands |
831 |
SNMP |
831 |
Unsupported Global Configuration Commands |
831 |
SNMPv3 |
831 |
Unsupported 3DES Encryption Commands |
831 |
Spanning Tree |
832 |
Unsupported Global Configuration Command |
832 |
Unsupported Interface Configuration Command |
832 |
VLAN |
832 |
Unsupported Global Configuration Command |
832 |
Unsupported vlan-config Command |
832 |
Unsupported User EXEC Commands |
832 |
VTP |
832 |
Unsupported Privileged EXEC Commands |
832 |