Numerics -
A -
B -
C -
D -
E -
F -
G -
H -
I -
J -
L -
M -
N -
O -
P -
Q -
R -
S -
T -
U -
V -
W -
X -
Index
Numerics
802.1D
See STP
802.1Q
and trunk ports 9-3
configuration limitations 10-18
encapsulation 10-16
native VLAN for untagged traffic 10-23
trunk mode 3-9
802.1X
See port-based authentication
802.3Z flow control 9-14
A
abbreviating commands 2-4
ABRs 26-30
AC (command switch) 6-11, 6-21
access-class command 23-17
access control entries
See ACEs
access-denied response, VMPS 10-28
access groups
IP 23-19
Layer 3 23-19
accessing
clusters, switch 6-14
CMS 3-28
command switches 6-12
HTTP port 3-29
member switches 6-14
stack members 5-14
switch clusters 6-14
access lists
See ACLs
access ports
defined 9-2
in switch clusters 6-10
accounting
with RADIUS 7-28
with TACACS+ 7-11, 7-17
ACEs
and QoS 24-7
defined 23-2
Ethernet 23-2
IP 23-2
ACLs
ACEs 23-2
any keyword 23-11
applying
on bridged packets 23-36
on multicast packets 23-38
on routed packets 23-37
on switched packets 23-35
time ranges to 23-14
to a routed interface 23-18
to QoS 24-7
classifying traffic for QoS 24-28
comments in 23-17
compiling 23-20
configuring with VLAN maps 23-34
defined 23-1, 23-6
examples of 23-20, 24-28
extended IP
configuring for QoS classification 24-29
creating 23-9
matching criteria 23-6
hardware and software handling 23-19
host keyword 23-11
IP
applying to interface 23-18
creating 23-6
fragments and QoS guidelines 24-21
implicit deny 23-8, 23-12, 23-14
implicit masks 23-8
matching criteria 23-2, 23-6
named 23-13
undefined 23-19
violations, logging 23-14
virtual terminal lines, setting on 23-17
limiting actions 23-35
logging messages 23-9
log keyword 23-14
MAC extended 23-27, 24-30
matching 23-6, 23-19
monitoring 23-39
named 23-13
number per QoS class map 24-21
numbers 23-6
QoS 24-7, 24-28
router 23-2
standard IP
configuring for QoS classification 24-28
creating 23-8
matching criteria 23-6
supported features 23-19
support for 1-5
time ranges 23-15
unsupported features 23-5
using router ACLs with VLAN maps 23-34
VLAN maps
configuration guidelines 23-26
configuring 23-25
defined 23-3
active router 27-1
address aliasing 15-2
addresses
displaying the MAC address table 7-58
dynamic
accelerated aging 13-11
changing the aging time 7-54
default aging 13-11
defined 7-53
learning 7-53
removing 7-55
multicast
group address range 28-3
STP address management 13-9
static
adding and removing 7-57
defined 7-53
address resolution 26-9
Address Resolution Protocol
See ARP
adjacency tables, with CEF 26-45
administrative distances
defined 26-53
OSPF 26-35
routing protocol defaults 26-47
advertisements
CDP 17-1
IGRP 26-25
RIP 26-20
VTP 10-19, 11-3
aggregated ports
See EtherChannel
aggregate policers 24-36
aggregate policing 1-6
aging, accelerating 13-11
aging time
accelerated for STP 13-11, 13-20
MAC address table 7-54
maximum for STP 13-21
alarms, RMON 20-3
allowed-VLAN list 10-21
alternate routes, IGRP 26-26
Apply button 3-27
area border routers
See ABRs
ARP
configuring 26-9
defined 26-9
encapsulation 26-11
static cache configuration 26-9
support for 1-4
ASBRs 26-30
attributes, RADIUS
vendor-proprietary 7-30
vendor-specific 7-29
audience xxix
authentication
EIGRP 26-43
HSRP 27-8
local mode with AAA 7-32
NTP associations 7-36
RADIUS
key 7-21
login 7-23
authentication (continued)
See also port-based authentication
TACACS+
defined 7-11
key 7-13
login 7-14
authentication keys, and routing protocols 26-54
authoritative time source, described 7-33
authorization
with RADIUS 7-27
with TACACS+ 7-11, 7-16
authorized ports with 802.1X 8-4
autoconfiguration 4-3
automatic discovery
adding member switches 6-19
considerations
beyond a non-candidate device 6-8
brand new switches 6-10
connectivity 6-5
different VLANs 6-7
management VLANs 6-8
non-CDP-capable devices 6-6
non-cluster-capable devices 6-6
routed ports 6-9
creating a cluster standby group 6-21
in switch clusters 6-5
See also CDP
automatic recovery, clusters 6-11
See also HSRP
autonegotiation
duplex mode 1-3
interface configuration guidelines 9-13
mismatches 31-13
autonomous system boundary routers
See ASBRs
Auto-RP, described 28-5
autosensing, port speed 1-3
auxiliary VLAN
See voice VLAN
availability, features 1-4
B
BackboneFast
described 14-8
enabling 14-15
support for 1-4
bandwidth graphs 3-7
banners
configuring
login 7-52
message-of-the-day login 7-51
default configuration 7-50
when displayed 7-50
binding cluster group and HSRP group 27-9
blocking packets 16-5
booting
boot loader, function of 4-2
boot process 4-1
manually 4-13
specific image 4-14
boot loader
accessing 4-15
described 4-2
environment variables 4-15
prompt 4-15
trap-door mechanism 4-2
bootstrap router (BSR), described 28-5
BPDU
error-disabled state 14-3
filtering 14-3
BPDU filtering
described 14-3
enabling 14-14
BPDU guard
described 14-3
enabling 14-13
support for 1-5
bridged packets, ACLs on 23-36
bridge groups
See fallback bridging
bridge protocol data unit
See BPDU
broadcast flooding 26-17
broadcast packets
directed 26-14
flooded 26-14
broadcast storm-control command 16-3
broadcast storms 16-1, 26-14
browser configuration 3-1
buttons, CMS 3-27
C
cables, monitoring for unidirectional links 18-1
Cancel button 3-27
candidate switch
adding 6-19
automatic discovery 6-5
defined 6-4
HC 6-21
passwords 6-19
requirements 6-4
standby group 6-21
See also command switch, cluster standby group, and member switch
caution, described xxx
CC (command switch) 6-21
CDP
automatic discovery in switch clusters 6-5
configuring 17-2
default configuration 17-2
described 17-1
disabling for routing device 17-3, 17-4
enabling and disabling
on an interface 17-4
on a switch 17-3
monitoring 17-5
overview 17-1
support for 1-4
switch stack considerations 17-2
transmission timer and holdtime, setting 17-2
updates 17-2
CEF 26-45
CGMP
as IGMP snooping learning method 15-7
clearing cached group entries 28-51
enabling server support 28-33
joining multicast group 15-2
overview 28-7
server support only 28-7
switch support of 1-3
change notification, CMS 3-30
Cisco 7960 IP Phone 12-1
Cisco Discovery Protocol
See CDP
Cisco Express Forwarding
See CEF
Cisco Group Management Protocol
See CGMP
Cisco StackWise technology 1-2
See also stacks, switch
Cisco Technical Assistance Center xxxiii
CiscoWorks 2000 1-3, 22-4
classless routing 26-7
class maps for QoS
configuring 24-31
described 24-7
displaying 24-55
class of service
See CoS
clearing interfaces 9-19
CLI
abbreviating commands 2-4
command modes 2-1
described 1-3
editing features
enabling and disabling 2-7
keystroke editing 2-7
wrapped lines 2-8
error messages 2-5
filtering command output 2-9
getting help 2-3
history
changing the buffer size 2-5
described 2-5
disabling 2-6
recalling commands 2-6
managing clusters 6-24
no and default forms of commands 2-4
client mode, VTP 11-3
clock
See system clock
Cluster Management Suite
See CMS
clusters, switch
accessing 6-14
adding member switches 6-19
automatic discovery 6-5
automatic recovery 6-11
benefits 1-2
command switch configuration 6-18
compatibility 6-4
clusters, switch (continued)
creating 6-18
creating a cluster standby group 6-21
described 6-1
managing
through CLI 6-24
through SNMP 6-25
planning 6-4
planning considerations
automatic discovery 6-5
automatic recovery 6-11
CLI 6-24
host names 6-14
IP addresses 6-14
passwords 6-15
RADIUS 6-17
SNMP 6-15, 6-25
switch-specific features 6-17
switch stacks 6-15
TACACS+ 6-17
redundancy 6-21
troubleshooting 6-23
verifying 6-22
See also candidate switch, command switch, cluster standby group, member switch, and standby command switch
cluster standby group
and HSRP group 27-9
automatic recovery 6-13
considerations 6-12
creating 6-21
defined 6-2
requirements 6-3
virtual IP address 6-12
See also HSRP
cluster tree
described 3-5
icons 3-5
CMS
accessing 3-28
benefits 1-2
change notification 3-30
cluster tree 3-5
described 1-2, 1-3, 3-1
different versions of 3-31
displaying system messages 3-17
error checking 3-30
features 3-2
Front Panel images 3-5
Front Panel view 3-4
interaction modes 3-23
menu bar 3-14
online help 3-25
requirements 3-28
saving configuration changes 3-30
toolbar 3-18
tool tips 3-24
Topology view 3-9
verifying configuration changes 3-30
window components 3-26
wizards 3-24
collapsed cluster view 3-11
command-line interface
See CLI
command modes 2-1
commands
abbreviating 2-4
no and default 2-4
setting privilege levels 7-8
command switch
accessing 6-12
active (AC) 6-11, 6-21
command switch with HSRP disabled (CC) 6-21
configuration conflicts 31-12
defined 6-2
enabling 6-18
command switch (continued)
passive (PC) 6-11, 6-21
password privilege levels 6-24
priority 6-11
recovery
from command-switch failure 6-11
from failure 31-9
from lost member connectivity 31-12
redundant 6-11, 6-21
replacing
with another switch 31-11
with cluster member 31-9
requirements 6-3
standby (SC) 6-11, 6-21
See also candidate switch, cluster standby group, member switch, and standby command switch
community strings
configuring 6-15, 22-6
for cluster switches 22-4
in clusters 6-15
overview 22-3
SNMP 6-15
compatibility, software
See stacks, switch
config.text 4-12
configuration, switch, saving changes 3-30
configuration conflicts, recovering from lost member connectivity 31-12
configuration examples, network 1-10
configuration files
clearing the startup configuration B-20
creating using a text editor B-11
default name 4-12
deleting a stored configuration B-20
described B-9
configuration files (continued)
downloading
automatically 4-12
preparing B-11, B-14, B-17
reasons for B-9
using FTP B-14
using RCP B-18
using TFTP B-12
guidelines for creating and using B-10
invalid combinations when copying B-5
limiting TFTP server access 22-10
obtaining with DHCP 4-7
password recovery disable considerations 7-5
specifying the filename 4-13
system contact and location information 22-9
types and location B-10
uploading
preparing B-11, B-14, B-17
reasons for B-9
using FTP B-16
using RCP B-19
using TFTP B-12
configuration settings, saving 4-10
configure terminal command 9-7
config-vlan mode 2-2, 10-6
conflicts, configuration 31-12
connectivity problems 31-16
consistency checks in VTP version 2 11-4
console port, connecting to 2-10
conventions
command xxx
for examples xxx
publication xxx
text xxx
corrupted software, recovery steps with XMODEM 31-2
CoS
in Layer 2 frames 24-2
override priority 12-5
trust priority 12-5
CoS input queue threshold map for QoS 24-14
CoS output queue threshold map for QoS 24-16
CoS-to-DSCP map for QoS 24-38
counters, clearing interface 9-19
crashinfo file 31-23
cross-stack UplinkFast, STP
described 14-5
enabling 14-15
fast-convergence events 14-7
Fast Uplink Transition Protocol 14-6
normal-convergence events 14-7
support for 1-4
CWDM GBIC modules, wavelength colors on CMS 3-6
D
daylight saving time 7-45
debugging
enabling all system diagnostics 31-20
enabling for a specific feature 31-19
redirecting error message output 31-20
using commands 31-19
default commands 2-4
default configuration
802.1X 8-6
banners 7-50
booting 4-12
CDP 17-2
DNS 7-49
EIGRP 26-40
EtherChannel 25-9
fallback bridging 30-4
HSRP 27-3
IGMP 28-27
IGMP filtering 15-19
default configuration (continued)
IGMP snooping 15-5
IGRP 26-26
initial switch information 4-3
IP addressing, IP routing 26-5
IP multicast routing 28-9
Layer 2 interfaces 9-12
MAC address table 7-54
MSDP 29-4
MVR 15-14
NTP 7-36
optional spanning-tree features 14-12
OSPF 26-31
password and privilege level 7-2
QoS 24-18
RADIUS 7-20
RIP 26-20
RMON 20-3
RSPAN 19-10
SNMP 22-5
SPAN 19-10
STP 13-12
switch stacks 5-13
system message logging 21-4
system name and prompt 7-47
TACACS+ 7-13
UDLD 18-3
VLAN, Layer 2 Ethernet interfaces 10-19
VLANs 10-7
VMPS 10-29
voice VLAN 12-3
VTP 11-7
default gateway 4-10, 26-12
default networks 26-48
default routes 26-48
default routing 26-2
deleting VLANs 10-10
description command 9-15
designing your network, examples 1-10
destination addresses, in ACLs 23-10
destination-IP address based forwarding, EtherChannel 25-7
destination-MAC address forwarding, EtherChannel 25-6
detecting indirect link failures, STP 14-8
device discovery protocol 17-1
device icons, Front Panel view 3-5
device information 3-12
Device Manager 3-2
See also Switch Manager
device pop-up menu
Front Panel view 3-19
Topology view 3-21
DHCP-based autoconfiguration
client request message exchange 4-4
configuring
client side 4-3
DNS 4-6
relay device 4-6
server-side 4-5
TFTP server 4-5
example 4-8
lease options
for IP address information 4-5
for receiving the configuration file 4-5
overview 4-3
relationship to BOOTP 4-4
relay support 1-7
support for 1-3
Differentiated Services architecture, QoS 24-1
Differentiated Services Code Point 24-2
Diffusing Update Algorithm (DUAL) 26-39
directed unicast requests 1-4
directories
changing B-4
creating and removing B-4
displaying the working B-4
discovery, clusters
See automatic discovery
display options, Topology view 3-14
Disqualification Code option 3-23
Distance Vector Multicast Routing Protocol
See DVMRP
distance-vector protocols 26-3
distribute-list command 26-53
DNS
and DHCP-based autoconfiguration 4-6
default configuration 7-49
displaying the configuration 7-50
overview 7-48
setting up 7-49
support for 1-3
documentation
feedback xxxii
obtaining
CD-ROM xxxi
world wide web xxxi
ordering xxxii
related xxxi
document conventions xxx
domain names
DNS 7-48
VTP 11-8
Domain Name System
See DNS
downloading
configuration files
preparing B-11, B-14, B-17
reasons for B-9
using FTP B-14
using RCP B-18
using TFTP B-12
image files
deleting old image B-25
preparing B-23, B-26, B-30
reasons for B-21
using FTP B-27
using RCP B-32
using TFTP B-24
DSCP 1-6, 24-2
DSCP input queue threshold map for QoS 24-14
DSCP output queue threshold map for QoS 24-16
DSCP-to-CoS map for QoS 24-41
DSCP-to-DSCP-mutation map for QoS 24-42
DTP 1-5, 10-17
DUAL finite state machine, EIGRP 26-39
duplex mode, configuring 9-12
DVMRP
autosummarization
configuring a summary address 28-47
disabling 28-49
connecting PIM domain to DVMRP router 28-39
enabling unicast routing 28-43
interoperability
with Cisco devices 28-37
with IOS software 28-7
mrinfo requests, responding to 28-42
neighbors
advertising the default route to 28-41
discovery with Probe messages 28-37
displaying information 28-42
prevent peering with nonpruning 28-45
rejecting nonpruning 28-44
overview 28-7
routes
adding a metric offset 28-49
advertising all 28-49
advertising the default route to neighbors 28-41
caching DVMRP routes learned in report messages 28-43
changing the threshold for syslog messages 28-46
deleting 28-51
displaying 28-51
favoring one over another 28-49
limiting the number injected into MBONE 28-46
limiting unicast route advertisements 28-37
routing table 28-7
source distribution tree, building 28-7
support for 1-7
tunnels
configuring 28-39
displaying neighbor information 28-42
dynamic access mode 3-9
dynamic access ports
characteristics 10-3
configuring 10-31
defined 9-3
dynamic addresses
See addresses
dynamic auto trunking mode 10-17
dynamic desirable trunking mode 10-18
Dynamic Host Configuration Protocol
See DHCP-based autoconfiguration
dynamic port VLAN membership
described 10-29
reconfirming 10-31, 10-32
troubleshooting 10-33
types of connections 10-31
dynamic routing 26-3
Dynamic Trunking Protocol
See DTP
E
editing features
enabling and disabling 2-7
keystrokes used 2-7
wrapped lines 2-8
EIGRP
and IGRP 26-41
authentication 26-43
components 26-39
configuring 26-41
default configuration 26-40
definition 26-39
interface parameters, configuring 26-42
monitoring 26-44
support for 1-7
elections
See stack master
enable password 7-4
enable secret password 7-4
encryption for passwords 7-4
Enhanced IGRP
See EIGRP
environment variables
function of 4-16
equal-cost routing 1-7, 26-46
error checking, CMS 3-30
error messages during command entry 2-5
EtherChannel
automatic creation of 25-5
channel groups
binding physical and logical interfaces 25-4
numbering of 25-4
configuration guidelines 25-10
configuring
Layer 2 interfaces 25-11
Layer 3 physical interfaces 25-14
Layer 3 port-channel logical interfaces 25-13
default configuration 25-9
described 25-2
displaying status 25-19
forwarding methods 25-6, 25-16
interaction
with STP 25-10
with VLANs 25-10
Layer 3 interface 26-4
load balancing 25-6, 25-16
logical interfaces, described 25-4
number of interfaces per 25-2
PAgP
aggregate-port learners 25-17
compatibility with Catalyst 1900 25-17
described 25-5
displaying status 25-19
interaction with other features 25-6
learn method and priority configuration 25-17
modes 25-5
silent mode 25-6
support for 1-3
port-channel interfaces
described 25-4
numbering of 25-4
port groups 9-5
See also cross-stack EtherChannel
stack changes, effects of 25-8
support for 1-3
Ethernet VLANs
adding 10-8
defaults and ranges 10-8
modifying 10-8
events, RMON 20-3
examples
conventions for xxx
network configuration 1-10
expanded cluster view 3-10
expanded stack view 3-11
expert mode 3-24
extended-range VLANs
configuration guidelines 10-12
configuring 10-12
creating 10-12, 10-13
defined 10-1
extended system ID for STP 13-5, 13-14
Extensible Authentication Protocol over LAN 8-1
exterior routes, IGRP 26-25
F
failover support 1-4
fallback bridging
and protected ports 30-4
bridge groups
creating 30-4
described 30-2
displaying 30-11
function of 30-2
number supported 30-5
removing 30-5
bridge table
clearing 30-11
displaying 30-11
configuration guidelines 30-4
connecting interfaces with 9-6
default configuration 30-4
described 30-2
fallback bridging (continued)
frame forwarding
flooding packets 30-2
forwarding packets 30-2
overview 30-2
stack changes, effects of 30-3
STP
disabling on an interface 30-11
forward-delay interval 30-10
hello BPDU interval 30-9
interface priority 30-7
maximum-idle interval 30-10
path cost 30-8
VLAN-bridge spanning-tree priority 30-7
VLAN-bridge STP 30-2
support for 1-7
SVIs and routed ports 30-2
VLAN-bridge STP 13-10, 30-2
fan fault indication 3-5
Fast Uplink Transition Protocol 14-6
feedback to Cisco Systems, web xxxii
FIB 26-45
fiber-optic, detecting unidirectional links 18-1
files
copying B-5
crashinfo
description 31-23
displaying the contents of 31-23
location 31-23
deleting B-5
displaying the contents of B-8
tar
creating B-6
displaying the contents of B-7
extracting B-8
image file format B-22
file system
displaying available file systems B-2
displaying file information B-3
local file system names B-1
network file system names B-5
setting the default B-3
filtering
in a VLAN 23-25
non-IP traffic 23-27
show and more command output 2-9
filtering show and more command output 2-9
filters, IP
See ACLs, IP
Flash device, number of B-1
flash updates, IGRP 26-26
flooded traffic, blocking 16-6
flow-based packet classification 1-6
flowcharts
QoS classification 24-6
QoS egress queueing and scheduling 24-15
QoS ingress queueing and scheduling 24-13
QoS policing and marking 24-9
flow control 1-3, 9-14
forward-delay time, STP 13-20
Forwarding Information Base
See FIB
forwarding non-routable protocols 30-1
Front Panel images, CMS 3-5
Front Panel view
cluster tree 3-5
command switch 3-4
described 3-4
pop-up menus 3-19
port icons 3-6
port LEDs 3-7
RPS LED 3-7
switch images 3-5
FTP
accessing MIB files A-3
configuration files
downloading B-14
overview B-13
preparing the server B-14
uploading B-16
image files
deleting old image B-29
downloading B-27
preparing the server B-26
uploading B-29
G
get-bulk-request operation 22-3
get-next-request operation 22-3, 22-4
get-request operation 22-3, 22-4
get-response operation 22-3
Gigabit modules
See SFPs
global configuration mode 2-2
graphs, bandwidth 3-7
guide
audience xxix
purpose of xxix
guide mode 1-2, 3-23
H
hardware limitations and Layer 3 interfaces 9-16
HC (candidate switch) 6-21
hello time, STP 13-19
help, for the command line 2-3
Help button, CMS 3-27
Help Contents 3-25
history
changing the buffer size 2-5
described 2-5
disabling 2-6
recalling commands 2-6
history table, level and number of syslog messages 21-10
host name list, CMS 3-26
host names
abbreviations appended to 6-21
in clusters 6-14
hosts, limit on dynamic ports 10-33
Hot Standby Router Protocol
See HSRP
HP OpenView 1-3
HSRP
authentication string 27-8
automatic cluster recovery 6-13
binding to cluster group 27-9
cluster standby group considerations 6-12
command-switch redundancy 1-1, 1-4
configuring 27-3
default configuration 27-3
definition 27-1
monitoring 27-10
overview 27-1
priority 27-6
routing redundancy 1-7
switch stack considerations 27-2
timers 27-8
tracking 27-6
See also clusters, cluster standby group, and standby command switch
HTTP access 3-28, 3-29
Hypertext Transfer Protocol
See HTTP access
I
ICMP
redirect messages 26-12
support for 1-7
time exceeded messages 31-17
traceroute and 31-17
unreachable messages 23-18
unreachables and ACLs 23-19
ICMP ping
executing 31-16
overview 31-16
ICMP Router Discovery Protocol
See IRDP
icons
cluster tree 3-5
colors
cluster tree 3-5
Topology view 3-13
Front Panel view 3-6
toolbar 3-18
Topology view 3-12
IEEE 802.1P 12-1
IFS 1-4
IGMP
configuring the switch
as a member of a group 28-27
statically connected member 28-32
controlling access to groups 28-28
default configuration 28-27
deleting cache entries 28-51
displaying groups 28-51
fast switching 28-32
host-query interval, modifying 28-30
joining multicast group 15-2
join messages 15-2
leave processing, enabling 15-10
leaving multicast group 15-4
multicast reachability 28-27
overview 28-2
queries 15-3
support for 1-3
Version 1
changing to Version 2 28-29
described 28-3
Version 2
changing to Version 1 28-29
described 28-3
maximum query response time value 28-31
pruning groups 28-31
query timeout value 28-31
IGMP filtering
configuring 15-19
default configuration 15-19
described 15-19
monitoring 15-22
support for 1-3
IGMP groups, setting the maximum number 15-21
IGMP profile
applying 15-20
configuration mode 15-19
configuring 15-20
IGMP snooping
and address aliasing 15-2
and stack changes 15-5
configuring 15-5
default configuration 15-5
definition 15-2
enabling and disabling 15-6
global configuration 15-6
Immediate Leave 15-4
in the switch stack 15-5
method 15-6
monitoring 15-11
support for 1-3
VLAN configuration 15-6
IGP 26-30
IGRP
advertisements 26-25
alternate routes 26-26
configuring 26-27
default configuration 26-26
described 26-25
exterior routes 26-25
flash updates 26-26
interior routes 26-25
load balancing 26-26
poison-reverse updates 26-26
split horizon 26-29
support for 1-7
system routes 26-25
traffic sharing 26-27
unequal-cost load balancing 26-26
Immediate-Leave, IGMP 15-4
initial configuration
defaults 1-8
See also hardware installation guide
interaction modes, CMS 3-23
interface
number 9-7
range macros 9-10
interface command 9-6, 9-7
interface configuration mode 2-3
interfaces
configuration guidelines 9-13
configuring 9-7
configuring duplex mode 9-12
configuring speed 9-12
counters, clearing 9-19
described 9-15
descriptive name, adding 9-15
displaying information about 9-19
flow control 9-14
management 1-3
monitoring 9-19
naming 9-15
physical, identifying 9-6
range of 9-8
restarting 9-20
shutting down 9-20
supported 9-6
types of 9-1
interfaces range macro command 9-10
interface types 9-6
Interior Gateway Protocol
See IGP
Interior Gateway Routing Protocol
See IGRP
interior routes, IGRP 26-25
Internet Control Message Protocol
See ICMP
Internet Group Management Protocol
See IGMP
Inter-Switch Link
See ISL
inter-VLAN routing 1-7, 26-2
inventory, cluster 6-22
IOS File System
See IFS
ip access group command 23-19
IP ACLs
applying to an interface 23-18
extended, creating 23-9
for QoS classification 24-7
implicit deny 23-8, 23-12, 23-14
implicit masks 23-8
logging 23-14
named 23-13
standard, creating 23-8
undefined 23-19
virtual terminal lines, setting on 23-17
IP addresses
candidate or member 6-4, 6-14
classes of 26-6
cluster access 6-2
command switch 6-3, 6-12, 6-14
default configuration 26-5
for IP routing 26-5
MAC address association 26-9
monitoring 26-18
redundant clusters 6-12
standby command switch 6-12, 6-14
See also IP information
IP broadcast address 26-16
ip cef distributed command 26-45
IP directed broadcasts 26-14
ip igmp profile command 15-19
IP information
assigned
manually 4-9
through DHCP-based autoconfiguration 4-3
default configuration 4-3
IP multicast routing
addresses
all-hosts 28-3
all-multicast-routers 28-3
host group address range 28-3
administratively-scoped boundaries, described 28-35
and IGMP snooping 15-2
Auto-RP
adding to an existing sparse-mode cloud 28-14
benefits of 28-14
clearing the cache 28-51
configuration guidelines 28-10
filtering incoming RP announcement messages 28-17
overview 28-5
preventing candidate RP spoofing 28-17
preventing join messages to false RPs 28-16
setting up in a new internetwork 28-14
using with BSR 28-22
IP multicast routing (continued)
bootstrap router
configuration guidelines 28-10
configuring candidate BSRs 28-20
configuring candidate RPs 28-21
defining the IP multicast boundary 28-19
defining the PIM domain border 28-18
overview 28-5
using with Auto-RP 28-22
Cisco implementation 28-2
configuring
basic multicast routing 28-10
IP multicast boundary 28-35
default configuration 28-9
enabling
multicast forwarding 28-11
PIM mode 28-11
group-to-RP mappings
Auto-RP 28-5
BSR 28-5
MBONE
deleting sdr cache entries 28-51
described 28-34
displaying sdr cache 28-52
enabling sdr listener support 28-34
limiting DVMRP routes advertised 28-46
limiting sdr cache entry lifetime 28-35
SAP packets for conference session announcement 28-34
Session Directory (sdr) tool, described 28-34
monitoring
packet rate loss 28-52
peering devices 28-52
tracing a path 28-52
multicast forwarding, described 28-6
PIMv1 and PIMv2 interoperability 28-9
protocol interaction 28-2
reverse path check (RPF) 28-6
IP multicast routing (continued)
routing table
deleting 28-51
displaying 28-52
RP
assigning manually 28-12
configuring Auto-RP 28-14
configuring PIMv2 BSR 28-18
monitoring mapping information 28-23
using Auto-RP and BSR 28-22
stacking
stack master functions 28-8
stack member functions 28-8
statistics, displaying system and network 28-51
See also CGMP
See also DVMRP
See also IGMP
See also PIM
IP phones
and QoS 12-1
configuring 12-4
IP precedence 24-2
IP-precedence-to-DSCP map for QoS 24-39
IP protocols
in ACLs 23-10
routing 1-7
IP routes, monitoring 26-55
IP routing
connecting interfaces with 9-6
enabling 26-19
IP traceroute
executing 31-18
overview 31-17
IP unicast routing
address resolution 26-9
administrative distances 26-47, 26-53
ARP 26-9
assigning IP addresses to Layer 3 interfaces 26-6
authentication keys 26-54
IP unicast routing (continued)
broadcast
address 26-16
flooding 26-17
packets 26-14
storms 26-14
classless routing 26-7
configuring static routes 26-47
default
addressing configuration 26-5
gateways 26-12
networks 26-48
routes 26-48
routing 26-2
directed broadcasts 26-14
dynamic routing 26-3
enabling 26-19
EtherChannel Layer 3 interface 26-4
IGP 26-30
inter-VLAN 26-2
IP addressing
classes 26-6
configuring 26-5
IRDP 26-13
Layer 3 interfaces 26-4
MAC address and IP address 26-9
passive interfaces 26-52
protocols
distance-vector 26-3
dynamic 26-3
link-state 26-3
proxy ARP 26-9
redistribution 26-49
reverse address resolution 26-9
routed ports 26-4
static routing 26-2
steps to configure 26-4
subnet mask 26-6
subnet zero 26-7
IP unicast routing (continued)
supernet 26-7
UDP 26-16
with SVIs 26-4
See also EIGRP
See also IGRP
See also OSPF
See also RIP
IRDP
configuring 26-13
definition 26-13
support for 1-7
ISL
and trunk ports 9-3
encapsulation 1-5, 10-16
trunk mode 3-9
J
Java plug-in configuration 3-1
join messages, IGMP 15-2
L
Layer 2 frames, classification with CoS 24-2
Layer 2 interfaces, default configuration 9-12
Layer 2 trunks 10-17
Layer 3 features 1-7
Layer 3 interfaces
assigning IP addresses to 26-6
changing from Layer 2 mode 26-6
types of 26-4
Layer 3 packets, classification methods 24-2
leave processing, IGMP 15-10
LEDs
port 3-7, 3-8
port modes 3-7
RPS 3-7
legend, CMS icons and labels 3-18
line configuration mode 2-3
link information 3-12
link pop-up menu, Topology view 3-20
links, unidirectional 18-1
link state advertisements (LSAs) 26-34
link-state protocols 26-3
lists, CMS 3-27
load balancing, IGRP 26-26
logging messages, ACL 23-9
Logical Link Content window 3-21
login authentication
with RADIUS 7-23
with TACACS+ 7-14
login banners 7-50
log messages
See system message logging
Long-Reach Ethernet (LRE) technology 1-11
loop guard
described 14-11
enabling 14-17
M
MAC addresses
aging time 7-54
and VLAN association 7-54
building the address table 7-53
default configuration 7-54
displaying 7-58
dynamic
learning 7-53
removing 7-55
in ACLs 23-27
IP address association 26-9
static
adding 7-58
characteristics of 7-57
removing 7-58
MAC address notification, support for 1-7
MAC address-to-VLAN mapping 10-28
MAC extended access lists 23-27, 24-5, 24-30
manageability features 1-3
management access
in-band
browser session 1-4
CLI session 1-4
SNMP 1-4
out-of-band console port connection 1-4
management options
benefits 1-2
clustering 1-2
CMS 1-2
switch stacks 1-2
CLI 2-1
CMS 3-1
overview 1-3
management VLAN
considerations in switch clusters 6-8
discovery through different management VLANs 6-8
mapping tables for QoS
configuring
CoS-to-DSCP 24-38
DSCP 24-38
DSCP-to-CoS 24-41
DSCP-to-DSCP-mutation 24-42
IP-precedence-to-DSCP 24-39
policed-DSCP 24-40
described 24-10
marking
action in policy map 24-33
action with aggregate policers 24-36
described 24-3, 24-8
matching, ACLs 23-6
maximum aging time, STP 13-21
maximum-paths command 26-46
membership mode, VLAN port 3-8, 10-3
member switch
adding 6-19
automatic discovery 6-5
defined 6-2
managing 6-24
passwords 6-14
recovering from lost connectivity 31-12
requirements 6-4
See also candidate switch, cluster standby group, and standby command switch
menu bar
described 3-14
variations 3-14
messages
logging ACL violations 23-14
system 3-17
to users through banners 7-50
metric translations, between routing protocols 26-51
MIBs
accessing files with FTP A-3
location of files A-3
overview 22-1
SNMP interaction with 22-4
supported A-1
mirroring traffic for analysis 19-1
mismatches, autonegotiation 31-13
Mode button 3-7
modes
port 3-7
VLAN port membership 3-8
Modify button 3-27
module number 9-7
monitoring
access groups 23-39
ACL configuration 23-39
cables for unidirectional links 18-1
CDP 17-5
CEF 26-46
EIGRP 26-44
fallback bridging 30-11
features 1-7
HSRP 27-10
IGMP
filters 15-22
snooping 15-11
interfaces 9-19
IP
address tables 26-18
multicast routing 28-50
routes 26-55
MSDP peers 29-19
multicast router interfaces 15-11
MVR 15-18
network traffic for analysis with probe 19-2
OSPF 26-38
port
blocking 16-12
protection 16-12
RP mapping information 28-23
source-active messages 29-19
speed and duplex mode 9-13
traffic flowing among switches 20-1
traffic suppression 16-12
VLAN
filters 23-39
maps 23-39
VLANs 10-15
VMPS 10-32
VTP 11-16
MSDP
benefits of 29-3
clearing MSDP connections and statistics 29-19
controlling source information
forwarded by switch 29-12
originated by switch 29-8
received by switch 29-14
default configuration 29-4
dense-mode regions
sending SA messages to 29-17
specifying the originating address 29-18
filtering
incoming SA messages 29-14
SA messages to a peer 29-12
SA requests from a peer 29-11
join latency, defined 29-6
meshed groups
configuring 29-16
defined 29-16
originating address, changing 29-18
overview 29-1
peer-RPF flooding 29-2
peers
configuring a default 29-4
monitoring 29-19
peering relationship, overview 29-1
requesting source information from 29-8
shutting down 29-16
source-active messages
caching 29-6
clearing cache entries 29-19
defined 29-2
filtering from a peer 29-11
filtering incoming 29-14
filtering to a peer 29-12
limiting data with TTL 29-14
monitoring 29-19
restricting advertised sources 29-9
support for 1-7
multicast groups
Immediate Leave 15-4
joining 15-2
leaving 15-4
static joins 15-9
multicast packets
ACLs on 23-38
blocking 16-6
multicast router interfaces, monitoring 15-11
multicast router ports, adding 15-8
Multicast Source Discovery Protocol
See MSDP
multicast storm-control command 16-3
multicast storms 16-1
Multicast VLAN Registration
See MVR
multiple links in Topology view 3-21
MVR
and address aliasing 15-15
configuring interfaces 15-17
default configuration 15-14
described 15-12
in the switch stack 15-14
modes 15-16
monitoring 15-18
setting global parameters 15-15
support for 1-3
N
named IP ACLs 23-13
native VLAN
configuring 10-23
default 10-23
negotiate trunk mode 3-9
neighbor discovery/recovery, EIGRP 26-39
neighboring devices, types of 3-12
network configuration examples
cost-effective wiring closet 1-12
high-performance wiring closet 1-12
increasing network performance 1-10
large network 1-16
providing network services 1-11
small to medium-sized network 1-15
network design
performance 1-10
services 1-11
network management
CDP 17-1
RMON 20-1
SNMP 22-1
Network Time Protocol
See NTP
no commands 2-4
non-IP traffic filtering 23-27
nontrunking mode 10-17
normal-range VLANs
configuration modes 10-6
defined 10-1
no switchport command 9-4
note, described xxx
not-so-stubby areas
See NSSA
NSSA, OSPF 26-34
NTP
associations
authenticating 7-36
defined 7-34
enabling broadcast messages 7-38
peer 7-37
server 7-37
default configuration 7-36
displaying the configuration 7-42
overview 7-33
restricting access
creating an access group 7-40
disabling NTP services per interface 7-41
source IP address, configuring 7-41
stratum 7-33
support for 1-4
synchronizing devices 7-37
time
services 7-34
synchronizing 7-33
O
OK button 3-27
online help 3-25
Open Shortest Path First
See OSPF
optimizing system resources 31-13
options, management 1-3
OSPF
area parameters, configuring 26-34
configuring 26-32
default configuration
metrics 26-35
route 26-35
settings 26-31
described 26-30
interface parameters, configuring 26-33
LSA group pacing 26-37
monitoring 26-38
router IDs 26-37
route summarization 26-35
support for 1-7
virtual links 26-35
out-of-profile markdown 1-6
overheating indication, switch 3-5
P
packet modification, with QoS 24-17
PAgP
See EtherChannel
parallel paths, in routing tables 26-46
passive interfaces
configuring 26-52
OSPF 26-35
passwords
default configuration 7-2
disabling recovery of 7-5
encrypting 7-4
for security 1-5
in clusters 6-15, 6-19
in CMS 3-28
overview 7-1
recovery of 31-4
setting
enable 7-3
enable secret 7-4
Telnet 7-6
with usernames 7-7
VTP domain 11-8
path cost, STP 13-17
PC (passive command switch) 6-11, 6-21
performance, network design 1-10
performance features 1-3
per-VLAN Spanning Tree (PVST) 13-9
per-VLAN spanning tree plus (PVST+) 13-9
physical ports 9-2
PIM
default configuration 28-9
dense mode
overview 28-4
rendezvous point (RP), described 28-4
RPF lookups 28-7
displaying neighbors 28-52
enabling a mode 28-11
overview 28-3
router-query message interval, modifying 28-26
shared tree and source tree, overview 28-23
shortest path tree, delaying the use of 28-25
sparse mode
join messages and shared tree 28-4
overview 28-4
prune messages 28-5
RPF lookups 28-7
support for 1-7
versions
interoperability 28-9
troubleshooting interoperability problems 28-23
v2 improvements 28-4
PIM-DVMRP, as snooping method 15-7
ping
character output description 31-17
executing 31-16
overview 31-16
poison-reverse updates, IGRP 26-26
policed-DSCP map for QoS 24-40
policers
configuring
for each matched traffic class 24-33
for more than one traffic class 24-36
described 24-3
displaying 24-55
number of 24-21
types of 24-8
policing
described 24-3
token-bucket algorithm 24-9
policy maps for QoS
characteristics of 24-33
configuring 24-33
described 24-7
displaying 24-55
Port Aggregation Protocol
See EtherChannel
See PAgP
port-based authentication
authentication server
defined 8-2
RADIUS server 8-2
client, defined 8-2
configuration guidelines 8-7
configuring
manual re-authentication of a client 8-11
quiet period 8-11
RADIUS server 8-10
RADIUS server parameters on the switch 8-9
switch-to-client frame-retransmission number 8-12
switch-to-client retransmission time 8-12
default configuration 8-6
described 8-1
device roles 8-2
displaying statistics 8-14
EAPOL-start frame 8-3
EAP-request/identity frame 8-3
EAP-response/identity frame 8-3
enabling
802.1X authentication 8-8
periodic re-authentication 8-10
encapsulation 8-2
initiation and message exchange 8-3
method lists 8-8
ports
authorization state and dot1x port-control command 8-4
authorized and unauthorized 8-4
resetting to default values 8-14
stack changes, effects of 8-5
switch
as proxy 8-2
RADIUS client 8-2
topologies, supported 8-4
port blocking 1-3, 16-5
port-channel
See EtherChannel
Port Fast
described 14-2
enabling 14-12
mode, spanning tree 10-29
support for 1-5
port icons, Front Panel view 3-6
port LEDs
described 3-8
DUPLX 3-7
port modes 3-7
SPEED 3-7
STACK 3-7
STAT 3-7
port membership modes, VLAN 3-8, 10-3
port modes
described 3-7
LEDs 3-7
port pop-up menu, Front Panel view 3-20
port priority, STP 13-16
ports
802.1Q trunk 3-9
access 9-2
blocking 16-5
dynamic access 3-9, 10-3
ISL trunk 3-9
negotiate trunk 3-9
protected 16-4
routed 9-3
secure 16-7
static-access 3-9, 10-3, 10-11
switch 9-2
trunks 10-3, 10-16
VLAN assignments 10-11
port security
aging 16-11
and stacking 16-12
configuring 16-9
default configuration 16-8
described 16-7
displaying 16-13
violations 16-8
with other features 16-9
port-shutdown response, VMPS 10-28
preferential treatment of traffic
See QoS
preventing unauthorized access 7-1
priority
HSRP 27-6
overriding CoS 12-5
trusting CoS 12-5
private VLAN edge ports
See protected ports
privileged EXEC mode 2-2
privilege levels
changing the default for lines 7-9
command switch 6-24
exiting 7-9
logging into 7-9
mapping on member switches 6-24
overview 7-2, 7-7
setting a command with 7-8
protected ports 1-5, 16-4
protocol-dependent modules, EIGRP 26-40
Protocol-Independent Multicast Protocol
See PIM
proxy ARP
configuring 26-11
definition 26-9
with IP routing disabled 26-12
pruning, VTP
enabling 11-14
enabling on a port 10-22
examples 11-5
overview 11-4
pruning-eligible list
changing 10-22
for VTP pruning 11-5
VLANs 11-14
publications for products, technologies, and network solutions xxxiv
PVST 10-3
Q
QoS
basic model 24-3
classification
class maps, described 24-7
defined 24-3
flowchart 24-6
forwarding treatment 24-3
in frames and packets 24-2
IP ACLs, described 24-5, 24-7
MAC ACLs, described 24-5, 24-7
options for IP traffic 24-5
options for non-IP traffic 24-5
policy maps, described 24-7
trust DSCP, described 24-5
trusted CoS, described 24-5
trust IP precedence, described 24-5
class maps
configuring 24-31
displaying 24-55
configuration guidelines 24-21
configuring
aggregate policers 24-36
default port CoS value 24-25
DSCP maps 24-38
DSCP trust states bordering another domain 24-26
egress queue characteristics 24-48
ingress queue characteristics 24-43
IP extended ACLs 24-29
IP standard ACLs 24-28
MAC ACLs 24-30
policy maps 24-33
port trust states within the domain 24-23
default configuration 24-18
displaying statistics 24-55
egress queues
allocating buffer space 24-48
buffer allocation scheme, described 24-15
configuring shaped weights for SRR 24-52
configuring shared weights for SRR 24-53
described 24-4
displaying the threshold map 24-51
flowchart 24-15
mapping DSCP or CoS values 24-50
scheduling, described 24-4
setting WTD thresholds 24-48
WTD, described 24-16
enabling globally 24-22
flowcharts
classification 24-6
egress queueing and scheduling 24-15
ingress queueing and scheduling 24-13
policing and marking 24-9
implicit deny 24-7
ingress queues
allocating bandwidth 24-46
allocating buffer space 24-45
buffer and bandwidth allocation, described 24-14
configuring shared weights for SRR 24-46
configuring the priority queue 24-47
described 24-3
displaying the threshold map 24-44
flowchart 24-13
mapping DSCP or CoS values 24-44
priority queue, described 24-14
scheduling, described 24-3
setting WTD thresholds 24-44
WTD, described 24-14
limiting bandwidth on egress interface 24-54
mapping tables
CoS-to-DSCP 24-38
displaying 24-55
DSCP-to-CoS 24-41
DSCP-to-DSCP-mutation 24-42
IP-precedence-to-DSCP 24-39
policed-DSCP 24-40
types of 24-10
marked-down actions 24-34
marking, described 24-3, 24-8
overview 24-1
packet modification 24-17
policers
configuring 24-34, 24-36
described 24-8
displaying 24-55
number of 24-21
types of 24-8
policies, attaching to an interface 24-9
policing
described 24-3, 24-8
token bucket algorithm 24-9
policy maps
characteristics of 24-33
configuring 24-33
displaying 24-55
QoS label, defined 24-3
queues
configuring egress characteristics 24-48
configuring ingress characteristics 24-43
location of 24-11
SRR, described 24-12
WTD, described 24-11
rewrites 24-17
support for 1-6
trust states
bordering another domain 24-26
described 24-5
within the domain 24-23
quality of service
See QoS
queries, IGMP 15-3
R
RADIUS
attributes
vendor-proprietary 7-30
vendor-specific 7-29
configuring
accounting 7-28
authentication 7-23
authorization 7-27
communication, global 7-21, 7-29
communication, per-server 7-21
multiple UDP ports 7-21
default configuration 7-20
defining AAA server groups 7-25
displaying the configuration 7-31
identifying the server 7-21
in clusters 6-17
limiting the services to the user 7-27
method list, defined 7-20
operation of 7-19
overview 7-18
suggested network environments 7-18
support for 1-6
tracking services accessed by user 7-28
range
macro 9-10
of interfaces 9-8
RARP 26-9
rcommand command 6-24
RCP
configuration files
downloading B-18
overview B-17
preparing the server B-17
uploading B-19
image files
deleting old image B-33
downloading B-32
preparing the server B-30
uploading B-34
reconfirmation interval, VMPS, changing 10-32
recovery procedures 31-1
redundancy
EtherChannel 25-2
HSRP 27-1
STP
backbone 13-10
multidrop backbone 14-5
path cost 10-26
port priority 10-24
redundant clusters
See cluster standby group
redundant links and UplinkFast 14-15
redundant power system
See RPS
Refresh button 3-27
reliable transport protocol, EIGRP 26-39
reloading software 4-17
Remote Authentication Dial-In User Service
See RADIUS
Remote Copy Protocol
See RCP
Remote Network Monitoring
See RMON
resetting a UDLD-shutdown interface 18-5
restricting access
NTP services 7-39
overview 7-1
passwords and privilege levels 7-2
RADIUS 7-18
TACACS+ 7-10
retry count, VMPS, changing 10-32
reverse address resolution 26-9
Reverse Address Resolution Protocol
See RARP
RFC
1058, RIP 26-20
1112, IP multicast and IGMP 15-2
1157, SNMPv1 22-2
1166, IP addresses 26-6
1253, OSPF 26-30
1305, NTP 7-33
1587, NSSAs 26-30
1757, RMON 20-2
1901, SNMPv2C 22-2
1902 to 1907, SNMPv2 22-2
2236, IP multicast and IGMP 15-2
RIP
advertisements 26-20
authentication 26-23
configuring 26-21
default configuration 26-20
described 26-20
hop counts 26-20
split horizon 26-23
summary addresses 26-23
support for 1-7
RMON
default configuration 20-3
displaying status 20-6
enabling alarms and events 20-3
groups supported 20-2
overview 20-1
statistics
collecting group Ethernet 20-6
collecting group history 20-5
support for 1-7
root guard
described 14-10
enabling 14-16
support for 1-5
root switch, STP 13-14
route calculation timers, OSPF 26-36
routed packets, ACLs on 23-37
routed ports
configuring 26-4
defined 9-3
in switch clusters 6-9
IP addresses on 9-16, 26-4
router ACLs 23-2
router ID, OSPF 26-37
route summarization, OSPF 26-35
routing
default 26-2
dynamic 26-3
redistribution of information 26-49
static 26-2
Routing Information Protocol
See RIP
routing protocol administrative distances 26-47
RPS LED 3-7
RSPAN
and stack changes 19-9
configuration guidelines 19-15
default configuration 19-10
destination ports 19-7
displaying status 19-20
in a switch stack 19-2
interaction with other features 19-8
monitored ports 19-6
monitoring ports 19-7
overview 1-7, 19-1
received traffic 19-5
session limits 19-10
sessions
creating 19-16
defined 19-3
limiting source traffic to specific VLANs 19-19
specifying monitored ports 19-16
source ports 19-6
transmitted traffic 19-5
VLAN-based 19-6
running configuration, saving 4-10
S
SC (standby command switch) 6-11, 6-21
scheduled reloads 4-17
SDM
described 31-13
templates
configuring 31-14
number of 31-13
secure MAC addresses, and switch stacks 16-12
secure ports
and switch stacks 16-12
configuring 16-7
security, port 16-7
security features 1-5
sequence numbers in log messages 21-8
server mode, VTP 11-3
set-request operation 22-4
setup program, failed command switch replacement 31-9, 31-11
severity levels, defining in system messages 21-9
SFPs
numbering of 9-7
security and identification 31-15
shaped round robin
See SRR
show access-lists hw-summary command 23-20
show and more command output, filtering 2-9
show cdp traffic command 17-5
show cluster members command 6-24
show configuration command 9-15
show forward command 31-21
show interfaces command 9-13, 9-15
show platform forward command 31-21
show running-config command
displaying ACLs 23-18, 23-28, 23-31
interface description in 9-15
shutdown command on interfaces 9-20
Simple Network Management Protocol
See SNMP
small form-factor pluggable modules
See SFPs
SNAP 17-1
SNMP
accessing MIB variables with 22-4
agent
described 22-3
disabling 22-6
community strings
configuring 22-6
for cluster switches 22-4
overview 22-3
configuration examples 22-11
default configuration 22-5
in-band management 1-4
in clusters 6-15
informs
and trap keyword 22-7
described 22-4
differences from traps 22-5
enabling 22-9
limiting access by TFTP servers 22-10
limiting system log messages to NMS 21-10
manager functions 1-3, 22-3
managing clusters with 6-25
MIBs
location of A-3
supported A-1
notifications 22-4
overview 22-1, 22-4
status, displaying 22-11
system contact and location 22-9
trap manager, configuring 22-8
traps
described 22-3, 22-4
differences from informs 22-5
enabling 22-7
enabling MAC address notification 7-55
overview 22-1, 22-4
types of 22-7
versions supported 22-2
snooping, IGMP 15-2
software compatibility
See stacks, switch
software images
location in Flash B-21
recovery procedures 31-2
scheduling reloads 4-17
tar file format, described B-22
See also downloading and uploading
source addresses, in ACLs 23-10
source-and-destination-IP address based forwarding, EtherChannel 25-7
source-and-destination MAC address forwarding, EtherChannel 25-6
source-IP address based forwarding, EtherChannel 25-7
source-MAC address forwarding, EtherChannel 25-6
SPAN
and stack changes 19-9
configuration guidelines 19-10
default configuration 19-10
destination ports 19-7
displaying status 19-20
interaction with other features 19-8
monitored ports 19-6
monitoring ports 19-7
overview 1-7, 19-1
received traffic 19-5
session limits 19-10
sessions
creating 19-11
defined 19-3
limiting source traffic to specific VLANs 19-14
removing destination (monitoring) ports 19-13
specifying monitored ports 19-11
source ports 19-6
transmitted traffic 19-5
VLAN-based 19-6
spanning tree and native VLANs 10-19
Spanning Tree Protocol
See STP
speed, configuring on interfaces 9-12
split horizon
IGRP 26-29
RIP 26-23
SRR
configuring
shaped weights on egress queues 24-52
shared weights on egress queues 24-53
shared weights on ingress queues 24-46
described 24-12
shaped mode 24-12
shared mode 24-12
support for 1-6
stack changes, effects on
cross-stack EtherChannel 25-10
EtherChannel 25-8
fallback bridging 30-3
multicast routing 28-8
port-based authentication 8-5
STP 13-11
system message log 21-2
stack master
bridge ID (MAC address) 5-5
defined 5-1
election 5-5
re-election 5-5
See also stacks, switch
stack member
accessing CLI of specific member 5-14
configuring 5-13
member number 5-13
priority value 5-14
defined 5-1
displaying information of 5-14
hot-swappable 5-9
number 5-6
priority value 5-7
See also stacks, switch
stack member number 9-7
stack protocol version 5-7
stacks, switch
accessing CLI of specific member 5-14
assigning information 5-13
member number 5-13
priority value 5-14
benefits 1-2
bridge ID 5-5
CDP considerations 17-2
compatibility, software 5-7
configuration file 5-8
configuration scenarios 5-11
default configuration 5-13
default settings 5-13
description of 5-1
displaying information of 5-14
hot-swappable 5-9
HSRP considerations 27-2
in clusters 6-15
MAC address considerations 7-54
management connectivity 5-10
managing 5-1
membership 5-3
merged 5-3
multicast routing, stack master and member roles 28-8
partitioned 5-3, 31-8
See also stack master and stack member
software compatibility 5-7
software image version 5-8
stack protocol version 5-7
STP
bridge ID 13-2
root port selection 13-3
stack root switch election 13-3
supported spanning-tree instances 13-9
system messages
hostnames in the display 21-1
remotely monitoring 21-2
system prompt consideration 7-47
stacks, switch (continued)
system-wide configuration considerations 5-9
upgrading B-35
StackWise technology, Cisco 1-2
See also stacks, switch
Standby Command Configuration window 6-22
standby command switch
configuring 6-21
considerations 6-12
defined 6-2
priority 6-11
requirements 6-3
virtual IP address 6-12
See also cluster standby group and HSRP
standby group, cluster
See cluster standby group and HSRP
standby ip command 27-4
standby router 27-1
standby timers, HSRP 27-8
startup configuration
booting
manually 4-13
specific image 4-14
clearing B-20
configuration file
automatically downloading 4-12
specifying the filename 4-13
default boot configuration 4-12
static access mode 3-9
static access ports
assigning to VLAN 10-11
defined 9-3, 10-3
static addresses
See addresses
static IP routing 1-7
static MAC addressing 1-5
static routes, configuring 26-47
static routing 26-2
static VLAN membership 10-2
statistics
802.1X 8-14
CDP 17-5
interface 9-19
IP multicast routing 28-51
OSPF 26-38
QoS ingress and egress 24-55
RMON group Ethernet 20-6
RMON group history 20-5
SNMP input and output 22-11
VTP 11-16
status bar
change notification 3-30
error notification 3-30
storm control
configuring 16-3
described 16-1
displaying 16-12
support for 1-3
thresholds 16-1
STP
802.1D and bridge ID 13-5
802.1D and multicast addresses 13-9
802.1T and VLAN identifier 13-5
accelerating root port selection 14-4
BackboneFast
described 14-8
enabling 14-15
BPDU filtering
described 14-3
enabling 14-14
BPDU guard
described 14-3
enabling 14-13
BPDU message exchange 13-2
configuration guidelines 13-13
configuring
disable 13-14
forward-delay time 13-20
hello time 13-19
maximum aging time 13-21
path cost 13-17
port priority 13-16
root switch 13-14
secondary root switch 13-15
switch priority 13-19
cross-stack UplinkFast
described 14-5
enabling 14-15
default configuration 13-12
default optional feature configuration 14-12
designated port, defined 13-3
designated switch, defined 13-3
detecting indirect link failures 14-8
displaying status 13-21
extended system ID
affects on root switch 13-14
affects on the secondary root switch 13-15
overview 13-5
unexpected behavior 13-14
features supported 1-4
inferior BPDU 13-3
interface state, blocking to forwarding 14-2
interface states
blocking 13-8
disabled 13-9
forwarding 13-7, 13-8
learning 13-8
listening 13-8
overview 13-6
limitations with 802.1Q trunks 13-9
load sharing
overview 10-24
using path costs 10-26
using port priorities 10-24
loop guard
described 14-11
enabling 14-17
multicast addresses, affect of 13-9
optional features supported 1-5
overview 13-2
path costs 10-26, 10-27
Port Fast
described 14-2
enabling 14-12
port priorities 10-25
preventing root switch selection 14-10
redundant connectivity 13-10
root guard
described 14-10
enabling 14-16
root port, defined 13-3
root port selection on a switch stack 13-3
root switch
affects of extended system ID 13-5, 13-14
configuring 13-14
election 13-4
unexpected behavior 13-14
shutdown Port Fast-enabled port 14-3
stack changes, effects of 13-11
superior BPDU 13-3
supported number of spanning-tree instances 13-9
timers, described 13-5
UplinkFast
described 14-4
enabling 14-15
VLAN-bridge 13-10
stratum, NTP 7-33
stub areas, OSPF 26-34
subnet mask 26-6
subnet zero 26-7
success response, VMPS 10-28
summer time 7-45
SunNet Manager 1-3
supernet 26-7
SVIs
and IP unicast routing 26-4
and router ACLs 23-2
connecting VLANs 9-5
defined 9-4
routing between VLANs 10-2
switch clustering technology 6-1
See also clusters, switch 1-2
See clusters, switch
switch console port 1-4
Switch Database Management
See SDM
switched packets, ACLs on 23-35
switched ports 9-2
Switch Manager 3-31
switchport block multicast command 16-6
switchport block unicast command 16-6
switchport command 9-11
switchport protected command 16-5
switch priority, STP 13-19
switch software features 1-1
switch virtual interface
See SVI
syslog
See system message logging
system clock
configuring
daylight saving time 7-45
manually 7-43
summer time 7-45
time zones 7-44
displaying the time and date 7-43
overview 7-33
See also NTP
system message logging
default configuration 21-4
defining error message severity levels 21-9
disabling 21-4
displaying the configuration 21-13
enabling 21-5
facility keywords, described 21-13
level keywords, described 21-10
limiting messages 21-10
message format 21-2
overview 21-1
sequence numbers, enabling and disabling 21-8
setting the display destination device 21-5
stack changes, effects of 21-2
synchronizing log messages 21-6
syslog facility 1-7
timestamps, enabling and disabling 21-8
UNIX syslog servers
configuring the daemon 21-11
configuring the logging facility 21-12
facilities supported 21-13
system messages on CMS 3-17
system name
default configuration 7-47
default setting 7-47
manual configuration 7-47
See also DNS
system prompt
default setting 7-47
manual configuration 7-48
system resources, optimizing 31-13
system routes, IGRP 26-25
T
tables, CMS 3-27
tabs, CMS 3-27
TAC
inquiries xxxiii
toll-free telephone numbers xxxiv
website xxxiii
TACACS+
accounting, defined 7-11
authentication, defined 7-11
authorization, defined 7-11
configuring
accounting 7-17
authentication key 7-13
authorization 7-16
login authentication 7-14
default configuration 7-13
displaying the configuration 7-17
identifying the server 7-13
in clusters 6-17
limiting the services to the user 7-16
operation of 7-12
overview 7-10
support for 1-6
tracking services accessed by user 7-17
tar files
creating B-6
displaying the contents of B-7
extracting B-8
image file format B-22
technical assistance
Cisco.com xxxii
TAC xxxiii
TAC website xxxiii
toll-free telephone numbers xxxiv
Telnet
accessing management interfaces 2-10
from a browser 2-10
number of connections 1-4
setting a password 7-6
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password 7-6
TFTP
configuration files
downloading B-12
preparing the server B-11
uploading B-12
configuration files in base directory 4-6
configuring for autoconfiguration 4-5
image files
deleting B-25
downloading B-24
preparing the server B-23
uploading B-25
limiting access by servers 22-10
TFTP server 1-3
threshold, traffic level 16-2
time
See NTP and system clock
time-range command 23-14
time ranges in ACLs 23-14
timestamps in log messages 21-8
time zones 7-44
Token Ring VLANs
support for 10-5
VTP support 11-4
toolbar 3-18
tool tips 3-24
Topology view
collapsed cluster view 3-11
described 3-2, 3-9
device icons 3-13
device information 3-12
display options 3-14
expanded cluster view 3-10
expanded stack view 3-11
icons 3-12
link information 3-12
multiple links 3-21
neighboring devices 3-12
pop-up menus 3-20
TOS 1-6
traceroute command 31-18
See also IP traceroute
traffic
blocking flooded 16-6
fragmented 23-4
unfragmented 23-4
traffic policing 1-6
traffic suppression 16-1
transparent mode, VTP 11-3, 11-12
trap-door mechanism 4-2
traps
configuring MAC address notification 7-55
configuring managers 22-7
defined 22-3
enabling 7-55, 22-7
notification types 22-7
overview 22-1, 22-4
troubleshooting
connectivity problems 31-16
detecting unidirectional links 18-1
determining packet forwarding 31-21
displaying crash information 31-23
PIMv1 and PIMv2 interoperability problems 28-23
SFP security and identification 31-15
show forward command 31-21
troubleshooting (continued)
with CiscoWorks 22-4
with debug commands 31-19
with ping 31-16
with system message logging 21-1
with traceroute 31-17
trunking encapsulation 1-5
trunk ports
configuring 10-20
defined 9-3, 10-3
encapsulation 10-20, 10-25, 10-27
trunks
allowed-VLAN list 10-21
configuring 10-20, 10-25, 10-27
ISL 10-16
load sharing
setting STP path costs 10-26
using STP port priorities 10-24, 10-25
native VLAN for untagged traffic 10-23
parallel 10-26
pruning-eligible list 10-22
to non-DTP device 10-17
understanding 10-17
trusted port states
between QoS domains 24-26
classification options 24-5
support for 1-6
within a QoS domain 24-23
twisted-pair Ethernet, detecting unidirectional links 18-1
type-of-service
See TOS
U
UDLD
default configuration 18-3
echoing detection mechanism 18-2
enabling
globally 18-4
per interface 18-4
link-detection mechanism 18-1
neighbor database 18-2
overview 18-1
resetting an interface 18-5
status, displaying 18-5
support for 1-4
UDP, configuring 26-16
unauthorized ports with 802.1X 8-4
unequal-cost load balancing, IGRP 26-26
unicast storm control command 16-3
unicast storms 16-1
unicast traffic, blocking 16-6
UniDirectional Link Detection protocol
See UDLD
UNIX syslog servers
daemon configuration 21-11
facilities supported 21-13
message logging configuration 21-12
unrecognized Type-Length-Value (TLV) support 11-4
upgrading software images
See downloading
UplinkFast
described 14-4
enabling 14-15
support for 1-4
uploading
configuration files
preparing B-11, B-14, B-17
reasons for B-9
using FTP B-16
using RCP B-19
using TFTP B-12
image files
preparing B-23, B-26, B-30
reasons for B-21
using FTP B-29
using RCP B-34
using TFTP B-25
User Datagram Protocol
See UDP
user EXEC mode 2-2
username-based authentication 7-7
V
verifying changes in CMS 3-30
version-dependent transparent mode 11-4
version mismatch (VM) mode 5-8
virtual IP address
cluster standby group 6-12, 6-21
command switch 6-12, 6-21
See also IP addresses
virtual router 27-1, 27-2
vlan.dat file 10-4
VLAN ACLs
See VLAN maps
vlan-assignment response, VMPS 10-28
VLAN configuration
at bootup 10-7
saving 10-7
VLAN configuration mode 2-2, 10-6
VLAN database
and startup configuration file 10-7
and VTP 11-1
VLAN configuration saved in 10-7
VLANs saved in 10-4
vlan database command 10-6
vlan global configuration command 10-6
VLAN management domain 11-2
VLAN Management Policy Server
See VMPS
VLAN map entries, order of 23-26
VLAN maps
applying 23-31
common uses for 23-31
configuration example 23-32
configuration guidelines 23-26
configuring 23-25
creating 23-28
defined 23-2
denying access example 23-33
denying and permitting packets 23-28
displaying 23-39
examples 23-33
support for 1-5
usage 23-3
with router ACLs 23-39
VLAN membership
confirming 10-31
modes 3-8, 10-3
VLAN Query Protocol
See VQP
VLANs
adding 10-8
adding to VLAN database 10-8
aging dynamic addresses 13-11
allowed on trunk 10-21
and spanning-tree instances 10-3, 10-13
configuration guidelines, normal-range VLANs 10-5
configuration options 10-6
configuring 10-1
configuring IDs 1006 to 4094 10-12
connecting through SVIs 9-5
creating in config-vlan mode 10-8
creating in VLAN configuration mode 10-9
default configuration 10-7
deleting 10-10
described 9-2, 10-1
displaying 10-15
extended-range 10-1, 10-12
features 1-5
illustrated 10-2
internal 10-13
in the switch stack 10-6
limiting source traffic with RSPAN 19-19
limiting source traffic with SPAN 19-14
modifying 10-8
native, configuring 10-23
normal-range 10-1, 10-4
number supported 1-5
parameters 10-4
port membership modes 3-8, 10-3
static-access ports 10-11
STP and 802.1Q trunks 13-9
supported 10-2
Token Ring 10-5
traffic between 10-2
VLAN-bridge STP 13-10, 30-2
VTP modes 11-3
VLAN Trunking Protocol
See VTP
VLAN trunks 10-16, 10-17
VMPS
administering 10-32
configuration example 10-33
configuration guidelines 10-29
default configuration 10-29
description 10-28
dynamic port membership
described 10-29
reconfirming 10-32
troubleshooting 10-33
entering server address 10-30
mapping MAC addresses to VLANs 10-28
monitoring 10-32
reconfirmation interval, changing 10-32
reconfirming membership 10-31
retry count, changing 10-32
voice-over-IP 12-1
voice VLAN
Cisco 7960 phone, port connections 12-1
configuration guidelines 12-3
configuring IP phones for data traffic
override CoS of incoming frame 12-5
trust CoS priority of incoming frame 12-5
configuring ports for voice traffic in
802.1P priority tagged frames 12-5
802.1Q frames 12-4
connecting to an IP phone 12-4
default configuration 12-3
described 12-1
displaying 12-6
VQP 1-5, 10-28
VTP
adding a client to a domain 11-15
advertisements 10-19, 11-3
and extended-range VLANs 11-2
and normal-range VLANs 11-2
client mode, configuring 11-11
configuration
global configuration mode 11-7
guidelines 11-8
privileged EXEC mode 11-7
requirements 11-9
saving 11-7
VLAN configuration mode 11-8
configuration mode options 11-7
configuration requirements 11-9
configuration revision number
guideline 11-15
resetting 11-15
configuring
client mode 11-11
server mode 11-9
transparent mode 11-12
consistency checks 11-4
default configuration 11-7
described 11-1
disabling 11-12
domain names 11-8
domains 11-2
modes
client 11-3, 11-11
server 11-3, 11-9
transitions 11-3
transparent 11-3, 11-12
monitoring 11-16
passwords 11-8
pruning
disabling 11-14
enabling 11-14
examples 11-5
overview 11-4
support for 1-5
pruning-eligible list, changing 10-22
server mode, configuring 11-9
statistics 11-16
support for 1-5
Token Ring support 11-4
transparent mode, configuring 11-12
using 11-1
version, guidelines 11-9
version 1 11-4
version 2
configuration guidelines 11-9
disabling 11-13
enabling 11-13
overview 11-4
W
web-based management software
See CMS
weighted tail drop
See WTD
window components, CMS 3-26
wizards 1-2, 3-24
WTD
described 24-11
setting thresholds
egress queue-sets 24-48
ingress queues 24-44
support for 1-6
X
XMODEM protocol 31-2