Symbols -
Numerics -
A -
B -
C -
D -
E -
F -
G -
H -
I -
J -
K -
L -
M -
N -
O -
P -
Q -
R -
S -
T -
U -
V -
Index
Symbols
28-12
Numerics
802.10 SAID (default)8-4
802.1Q
trunks12-6
tunneling
compatibility with other features14-5
defaults14-4
described14-1
tunnel ports with other features14-6
802.1Q VLANs
encapsulation6-3
trunk restrictions6-5
802.1s
See MST
802.1w
See MST
802.1x
See port-based authentication
802.1x authentication
RADIUS accounting28-7
support for guest VLANs28-6
using with port security28-6
802.3ad
See LACP
A
AAA
enabling28-12
abbreviating commands2-5
access control entries
See ACEs
access ports
and Layer 2 protocol tunneling14-9
configuring6-8
access VLANs6-6
accounting
configuring for 802.1x28-15
ACEs
ACLs26-2
Ethernet26-2
IP26-2
Layer 4 operation restrictions26-6
ACLs
ACEs26-2
applying on routed packets26-19
applying on switched packets26-19
compatibility on the same switch26-3
configuring with VLAN maps26-18
CPU impact26-8
IP,matching criteria for port ACLs26-4
MAC extended26-9
matching criteria for router ACLs26-3
port
and voice VLAN26-4
defined26-2
limitations26-4
processing26-8
types supported26-2
acronyms, list ofA-1
active queue management32-14
addresses
See MAC addresses
adjacency tables
description22-2
displaying statistics22-9
advertisements, VTP
See VTP advertisements
alarms
major35-2
minor35-2
asymmetrical links, and 802.1Q tunneling14-4
audiencexxi
authentication
See also port-based authentication
authentication server
defined28-3
RADIUS server28-3
authorized and unauthorized ports28-4
authorized ports with 802.1X28-4
automatic QoS
See QoS
Auto-QoS
configuring32-16
B
BackboneFast
adding a switch (figure)13-2
and MST15-2
configuring13-15
link failure (figure)13-7, 13-8
not supported MST15-2
understanding13-6
See also STP
BGP1-8
routing session with multi-VRF CE23-6
blocking packets30-1
blocking state (STP)
RSTP comparisons (table)15-4
boot bootldr command3-18
boot command3-15
boot fields
See configuration register boot fields
boot system command3-13, 3-18
boot system flash command3-15
Border Gateway Protocol
See BGP
boundary ports
description15-6
BPDU Guard
and MST15-2
configuring13-12
overview13-4
BPDUs
and media speed12-2
pseudobridges and15-5
what they contain12-3
bridge ID
See STP bridge ID
bridge priority (STP)12-16
bridge protocol data units
See BPDUs
broadcast storm control
disabling31-4
BSR
configuration example25-21
burst rate32-40
burst size32-27
C
cautions for passwords
encrypting3-9
TACACS+3-9
CDP
and trusted boundary32-25
configuration17-2
displaying configuration17-3
enabling on interfaces17-3
Layer 2 protocol tunneling14-7
maintaining17-3
monitoring17-3
overview1-2, 17-1
cdp enable command17-3
CEF
adjacency tables22-2
configuring load balancing22-7
displaying statistics22-8
enabling22-6
hardware switching22-4
load balancing22-6
overview22-1
software switching22-4
CGMP
overview16-1
channel-group group command18-7, 18-9
Cisco Discovery Protocol
See CDP
Cisco Express Forwarding
See CEF
Cisco Group Management Protocol
See CGMP
Cisco IP Phones
configuring37-2
Cisco IP phones
sound quality37-1
CiscoView1-12
CIST
description15-2
class-map command32-28
class of service
See CoS
clear cdp counters command17-4
clear cdp table command17-3
clear counters command4-13
clearing
IP multicast table entries25-20
clear ip flow stats command33-6
CLI
accessing2-1
backing out one level2-5
getting commands2-5
history substitution2-3
modes2-5
monitoring environments34-1
ROM monitor2-6
software basics2-4
clients
in 802.1x authentication28-2
command-line processing2-3
command modes2-5
commands
listing2-5
command switches
in VMPS9-1
common and internal spanning tree
See CIST
common spanning tree
See CST
community ports
description10-1
community VLANs
description10-2
config-register command3-16
config terminal command3-2
configuration files
saving3-3
configuration guidelines
for VMPS9-3
configuration register
boot fields
listing value3-16
modifying3-15
changing settings3-15to 3-16
configuring3-13
settings at startup3-14
configure terminal command3-15, 4-2
console configuration mode2-5
console port
disconnecting user sessions5-5
monitoring user sessions5-4
copy running-config startup-config command3-3
copy system:running-config nvram:startup-config command3-18
CoS
configuring port value32-37
definition32-3
figure32-2
overriding on Cisco IP Phones37-3
priority37-3
CoS-to-DSCP maps32-41
counters
clearing MFIB25-20
clearing on interfaces4-13
CPU port sniffing34-10
CST
description15-5
IST and15-2
MST and15-2
customer edge devices23-2
D
default configuration
802.1X28-11
auto-QoS32-16
IGMP filtering16-17
Layer 2 protocol tunneling14-9
multi-VRF CE23-3
SPAN and RSPAN34-6
default gateway
configuring3-4
verifying configuration3-5
default ports
and support for 802.1x authentication28-12
description command4-9
detecting unidirectional links19-1
DHCP snooping
configuration guidelines20-3
configuring20-3
default configuration20-3
displaying binding tables20-10
displaying configuration20-10
enabling20-4
enabling on private VLAN20-5
enabling the database agent20-6
monitoring20-10, 20-13, 20-14
overview20-1
Snooping database agent20-2
DHCP Snooping Database Agent
adding to the database (example)20-9
enabling (example)20-6
overview20-2
reading from a TFTP file (example)20-8
Differentiated Services Code Point values
See DSCP values
DiffServ architecture, QoS32-2
disabled state
RSTP comparisons (table)15-4
disabling
broadcast storm control31-4
disconnect command5-5
documentation
organizationxxi
relatedxxiii
double-tagged packets
802.1Q tunneling14-2
Layer 2 protocol tunneling14-9
drop threshold for Layer 2 protocol packets14-9
DSCP maps32-41
DSCP-to-CoS maps
configuring32-43
DSCP values
configuring maps32-41
configuring port value32-38
definition32-4
IP precedence32-2
mapping markdown32-23
mapping to transmit queues32-39
DTP
VLAN trunks and6-3
duplex command4-8
duplex mode
configuring interface4-6
Dynamic Host Configuration Protocol snooping
See DHCP snooping
dynamic ports
limit on hosts9-8
dynamic port VLAN membership
configuring9-5
overview9-2
reconfirming9-7
troubleshooting9-8
Dynamic Trunking Protocol
See DTP
E
EAP
request/identity frame28-3
response/identity frame28-3
EAP frames
changing retransmission time28-18
exchanging (figure)28-4
setting retransmission number28-19
EAPOL frame
start28-3
EAPOL frames
802.1x authentication and28-2
OTP authentication, example (figure)28-4
edge ports
description15-7
EGP
overview1-8
EIGRP
overview1-8
Embedded CiscoView1-12
enable command3-2, 3-15
enable mode2-5
encapsulation types6-3
Enhanced Interior Gateway Routing Protocol
See EIGRP
environmental monitoring
LED indications35-2
SNMP traps35-2
supervisor engine35-2
switching modules35-2
using CLI commands35-1
EtherChannel
channel-group group command18-7, 18-9
configuration guidelines18-5
configuring18-6to 18-14
configuring Layer 218-9
configuring Layer 318-6
interface port-channel command18-7
lacp system-priority
command example18-12
modes18-3
overview18-1
PAgP
Understanding18-3
physical interface configuration18-7
port-channel interfaces18-2
port-channel load-balance command18-12
removing18-13
removing interfaces18-13
EtherChannel ports
802.1x authentication not supported in28-12
explicit host tracking
enabling16-8
extended range VLANs
See VLANs
Extensible Authentication Protocol over LAN28-2
Exterior Gateway Protocol
See EGP
F
FastDrop
clearing entries25-20
displaying entries25-19
overview25-10
FIB
description22-2
See also MFIB
filtering
in a VLAN26-10
non-IP traffic26-9
flags25-11
Flash memory
configuring router to boot from3-17
loading system images from3-17
security precautions3-17
flooded traffic, blocking30-2
forward-delay time (STP)
configuring12-18
forwarding information base
See FIB
G
gateway
See default gateway
global configuration mode2-5
Guest-VLANs
configure with 802.1x28-16
H
hardware switching22-5
hello time (STP)
configuring12-17
history
CLI2-3
hop counts
configuring MST bridges15-7
host
configuring host statically16-8
limit on dynamic port9-8
Hot Standby Routing Protocol
See HSRP
HSRP
description1-6
hw-module module num power command35-21
I
ICMP
enabling5-10
ping5-5
running IP traceroute5-7
time exceeded messages5-7
IDS
using with SPAN and RSPAN34-2
IEEE 802.1s
See MST
IEEE 802.1w
See MST
IEEE 802.3ad
See LACP
IGMP
description25-3
enabling25-13
explicit host tracking16-3, 16-8
immediate-leave processing16-3
overview16-1
IGMP filtering
configuring16-17
default configuration16-17
described16-16
monitoring16-20
IGMP groups
setting the maximum number16-19
IGMP profile
applying16-18
configuration mode16-17
configuring16-17
IGMP snooping
configuration guidelines16-4
enabling16-5
IP multicast and25-4
monitoring16-11
overview16-1
IGRP
description1-7
immediate-leave processing
enabling16-7
IGMP
See fast-leave processing
ingress packets, SPAN enhancement34-12
inline power
configuring on Cisco IP phones37-4
See PoE
Intelligent Power Management35-20
interface command3-2, 4-1
interface port-channel command18-6, 18-7
interface range command4-4
interface range macro command4-5
interfaces
adding descriptive name4-8
clearing counters4-13
configuring4-2
configuring ranges4-4
displaying information about4-12
Layer 2 modes6-4
maintaining4-12
monitoring4-12
naming4-8
numbers4-2
overview4-1
restarting4-13
See also Layer 2 interfaces
Interior Gateway Routing Protocol
See IGRP
Internet Control Message Protocol
See ICMP
Internet Group Management Protocol
See IGMP
Inter-Switch Link encapsulation
See ISL encapsulation
Intrusion Detection System
See IDS
IP
configuring default gateway3-4
configuring static routes3-5
displaying statistics22-8
flow switching cache33-6
ip cef command22-6
ip flow-aggregation cache destination-prefix command33-8
ip flow-aggregation cache prefix command33-8
ip flow-aggregation cache source-prefix command33-8
ip flow-export command33-6
ip icmp rate-limit unreachable command5-11
ip igmp profile command16-17
ip igmp snooping tcn flood command16-10
ip igmp snooping tcn flood query count command16-10
ip igmp snooping tcn query solicit command16-11
ip load-sharing per-destination command22-7
ip local policy route-map command24-5
ip mask-reply command5-12
IP multicast
clearing table entries25-20
configuring25-12
default configuration25-13
displaying PIM information25-15
displaying the routing table information25-16
enabling25-13
enabling dense-mode PIM25-14
enabling sparse-mode25-14
features not supported25-12
hardware forwarding25-8
IGMP snooping and16-4, 25-4
monitoring25-15
overview25-1
routing protocols25-2
software forwarding25-8
See also Auto-RP; IGMP; PIM; RP; RPF
ip multicast-routing command25-13
IP phones
automatic classification and queueing32-16
configuring voice ports37-2
See Cisco IP Phones37-1
trusted boundary for QoS32-24
ip pim command25-14
ip pim dense-mode command25-14
ip pim sparse-dense-mode command25-15
ip policy route-map command24-4
ip redirects command5-11
ip route-cache flow command33-5
IP routing tables
deleting entries25-20
IP Source Guard
configuring20-11
configuring on private VLANs20-13
displaying20-13, 20-14
overview20-11
IP statistics
displaying22-8
IP traceroute
executing5-7
overview5-7
IP unicast
displaying statistics22-8
ip unreachables command5-10
IPX
redistribution of route information with EIGRP1-8
ISL
encapsulation6-3
trunking with 802.1Q tunneling14-4
isolated ports
description10-1
isolated VLANs
description10-2
IST
description15-2
MST regions and15-2
IST master
description15-7
J
jumbo frames
and ethernet ports4-10
configuring MTU sizes for4-11
ports and linecards that support4-9
VLAN interfaces4-10
K
keyboard shortcuts2-3
L
l2protocol-tunnel command14-11
labels
definition32-3
LACP
system ID18-4
Layer 2 access ports6-8
Layer 2 frames
classification with CoS32-2
Layer 2 interfaces
assigning VLANs8-8
configuring6-5
configuring as PVLAN host ports10-8
configuring as PVLAN promiscuous ports10-7
configuring as PVLAN trunk ports10-9
defaults6-5
disabling configuration6-9
modes6-4
show interfaces command6-7
Layer 2 interface type
resetting10-11
setting10-11
Layer 2 protocol tunneling
configuring14-9
default configuration14-9
defined14-7
guidelines14-10
Layer 2 switching
overview6-1
Layer 2 Traceroute
and ARP5-9
and CDP5-8
described5-8
host-to-host paths5-8
IP addresses and subnets5-9
MAC addresses and VLANs5-9
multicast traffic5-9
multiple devices on a port5-9
unicast traffic1-3, 5-8
usage guidelines5-8
Layer 2 trunks
configuring6-6
overview6-3
Layer 3 packets
classification methods32-2
Layer 4 port operations
configuration guidelines26-6
restrictions26-6
LEDs
description (table)35-2
listening state (STP)
RSTP comparisons (table)15-4
load balancing
configuring for CEF22-7
configuring for EtherChannel18-12
overview18-5, 22-6
per-destination22-7
login timer
changing5-4
logoutwarning command5-4
loop guard
and MST15-2
configuring13-9
overview13-2
M
MAC addresses
allocating12-5
building tables6-2
convert dynamic to sticky secure27-2
displaying5-3
displaying in DHCP snooping binding table20-10
in ACLs26-9
sticky27-2
sticky secure, adding27-2
MAC extended access lists26-9
macros
See SmartPort macros
mapping
DSCP markdown values32-23
DSCP values to transmit queues32-39
mapping tables
configuring DSCP32-41
described32-13
mask destination command33-8
mask source command33-8
match ip address command24-3
maximum aging time (STP)
configuring12-18
member switches
in VMPS9-1
metro tags14-2
MFIB
CEF25-5
displaying25-18
overview25-11
modules
checking status5-1
powering down35-21
monitoring
802.1Q tunneling14-12
ACL information26-26
IGMP filters16-20
IGMP snooping16-11
Layer 2 protocol tunneling14-12
multi-VRF CE23-11
tunneling14-12
VLAN filters26-17
VLAN maps26-17
M-record15-2
MST
and multiple spanning trees1-4, 15-2
boundary ports15-6
BPDUs15-2
configuration parameters15-5
configuring15-9
displaying configurations15-13
edge ports15-7
enabling15-9
hop count15-7
instances
configuring parameters15-12
description15-2
number supported15-5
interoperability with PVST+15-2
link type15-7
master15-7
message age15-7
regions15-5, 15-6
restrictions15-8
to-SST interoperability15-4
MSTP
M-record15-2
M-tree15-2
M-tree15-2
MTU size
configuring4-11
MTU size (default)8-4
multicast
See IP multicast
multicast packets
blocking30-2
multicast routers
displaying routing tables25-16
flood suppression16-9
Multicast Storm Control
overview31-6
suppression on WS-X401431-7
suppression on WS-X401631-6
multiple forwarding paths1-4, 15-2
Multiple Spanning Tree
See MST
multiple VPN routing/forwarding in customer edge devices
See multi-VRF CE
multi-VRF CE
components23-3
configuration example23-7
default configuration23-3
defined23-1
displaying23-11
monitoring23-11
network components23-3
packet-forwarding process23-3
N
native VLAN
and 802.1Q tunneling14-4
specifying6-6
NetFlow
aggregation
minimum mask,default value33-8
destination-prefix aggregation
configuration (example)33-13
minimum mask, configuring33-8
IP
flow switching cache33-6
prefix aggregation
configuration (example)33-10
minimum mask, configuring33-8
source-prefix aggregation
minimum mask, configuring33-8
switching
configuration (example)33-9
configuring33-5
exporting cache entries33-6
statistics33-6
NetFlow statistics
caveats on supervisor33-4
configuring collection33-4
implementing collection33-4
overview of collection33-1
network fault tolerance1-4, 15-2
network management
configuring17-1
Next Hop Resolution Protocol
See NHRP
NFFC/NFFC II
IGMP snooping and16-4
NHRP
support1-8
non-IP traffic filtering26-9
non-RPF traffic
description25-9
in redundant configurations (figure)25-10
nonvolatile random-access memory
See NVRAM
normal-range VLANs
See VLANs
NVRAM
saving settings3-3
O
OIR
overview4-12
online insertion and removal
See OIR
Open Shortest Path First
See OSPF
operating system images
See system images
OSPF
area concept1-7
description1-7
P
packets
modifying32-15
packet type filtering34-13
PAgP
understanding18-3
passwords
configuring enable password3-7
configuring enable secret password3-7
encrypting3-9
recovering lost enable password3-12
setting line password3-8
setting TACACS+3-8
PBR (policy-based routing)
configuration (example)24-5
enabling24-3
features24-2
overview24-1
route maps24-2
when to use24-2
per-port and VLAN Access Control List20-11
Per-VLAN Rapid Spanning Tree12-6
enabling12-20
overview12-6
PE to CE routing, configuring23-6
PIM
configuring dense mode25-14
configuring sparse mode25-14
displaying information25-15
displaying statistics25-20
enabling sparse-dense mode25-14, 25-15
overview25-3
PIM-DM25-3
PIM-SM25-3
ping
executing5-6
overview5-5
ping command5-6, 25-15
PoE35-22
configuring35-16
configuring power consumption for single device35-20
configuring power consumption for switch35-19
power consumption for powered devices
Intelligent Power Management35-20
powering down a module35-21
power management modes35-16
show interface status35-21
point-to-point
in 802.1x authentication (figure)28-2, 28-8
police command32-32
policed-DSCP map32-42
policers
description32-5
number of32-11
types of32-10
policies
See QoS policies
policing
See QoS policing
policy-map command32-29, 32-31
policy maps
attaching to interfaces32-34
configuring32-30
port ACLs
and voice VLAN26-4
defined26-2
limitations26-4
Port Aggregation Protocol
see PAgP
port-based authentication
changing the quiet period28-17
client, defined28-2
configuration guidelines28-12
configure 802.1x accounting28-15
configure switch-to-RADIUS server communication28-14
configure with Guest-VLANs28-16
configuring Guest-VLAN28-14
configuring manual re-authentication of a client28-17
controlling authorization state28-4
default configuration28-11
described28-2
device roles28-2
disabling28-13
displaying statistics28-21
enabling28-12
enabling multiple hosts28-20
enabling periodic re-authentication28-16
encapsulation28-2
initiation and message exchange28-3
method lists28-12
ports not supported28-4
resetting to default values28-20
setting retransmission number28-19
setting retransmission time28-18
topologies, supported28-9
using with port security28-6
with VLAN assignment28-5
port-based QoS features
See QoS
port-channel interfaces
See also EtherChannel
creating18-6
overview18-2
port-channel load-balance
command18-11
command example18-12
port-channel load-balance command18-12
port cost (STP)
configuring12-15
PortFast
and MST15-2
BPDU filter,configuring13-12
configuring or enabling13-11
overview13-3
PortFast BPDU filtering
and MST15-2
enabling13-12
overview13-4
PortFast STP parameter9-3
port priority
configuring MST instances15-12
configuring STP12-13
ports
blocking30-1
checking status5-2
community10-1
dynamic VLAN membership
configuring9-5
overview9-2
reconfirming9-7
forwarding, resuming30-3
isolated10-1
PVLAN types10-1
secure27-1
See also interfaces
port security
aging27-6
and QoS trusted boundary32-24
configuring27-4
default configuration27-3
described27-1
displaying27-7
RADIUS accounting28-7
sticky learning27-2
using with 802.1x28-6
violations27-2
with other features27-3
port states
description12-5
port trust state
See trust states
power, inline37-4
power dc input command35-10
power inline command35-17
power inline consumption command35-19, 35-20
power management
1+1 redundancy mode35-11
2+1 redundancy mode35-11
Catalyst 4006 switch35-10
Catalyst 4500 series35-3
Catalyst 4500 Series power supplies35-9
combined mode35-4
configuring combined mode35-8
configuring redundant mode35-7
overview35-1
redundancy35-10
redundant mode35-4
power over Ethernet
See PoE
power redundancy
setting on Catalyst 400635-13
power redundancy-mode comand35-7
power supplies
fixed35-3
variable35-4
power supplies required command35-13
primary VLANs
associating with secondary VLANs10-6
description10-1
priority
overriding CoS of incoming frames37-3
privileged EXEC mode2-5
privileges
changing default3-10
configuring levels3-10
exiting3-11
logging in3-11
promiscuous ports
configuring PVLAN10-7
description10-1
setting mode10-11
protocol timers12-4
provider edge devices23-2
pruning, VTP
See VTP pruning
pseudobridges
description15-5
PVACL20-11
PVLANs
802.1q support10-3
configuration guidelines10-4
configuring10-4
configuring promiscuous ports10-7
host ports
setting10-11
isolated VLANs10-2
overview10-1
permitting routing, example10-10
promiscuous mode
setting10-11
setting
interface mode10-11
Q
QoS
allocating bandwidth32-40
auto-QoS
configuration and defaults display32-19
configuration guidelines32-17
described32-16
displaying32-19
effects on NVRAM configuration32-17
enabling for VoIP32-18
basic model32-5
burst size32-27
classification32-6to 32-10
configuration guidelines32-23
auto-QoS32-17
configuring
auto-QoS32-16
DSCP maps32-41
traffic shaping32-40
trusted boundary32-24
VLAN-based32-35
creating policing rules32-28
default auto configuration32-16
default configuration32-22
definitions32-3
disabling on interfaces32-34
enabling on interfaces32-34
flowcharts32-8, 32-12
IP phones
automatic classification and queueing32-16
detection and trusted settings32-16, 32-24
overview32-1
packet modification32-15
port-based32-35
priority32-15
traffic shaping32-15
transmit rate32-40
trust states
trusted device32-24
VLAN-based32-35
See also COS; DSCP values; transmit queues
QoS active queue management
tracking queue length32-14
QoS labels
definition32-3
QoS mapping tables
CoS-to-DSCP32-41
DSCP-to-CoS32-43
policed-DSCP32-42
types32-13
QoS marking
description32-5
QoS policers
burst size32-27
numbers of32-11
types of32-10
QoS policing
definition32-5
described32-5, 32-10
QoS policy
attaching to interfaces32-11
overview of configuration32-28
QoS transmit queues
allocating bandwidth32-40
burst32-15
configuring32-38
configuring traffic shaping32-40
mapping DHCP values to32-39
maximum rate32-15
overview32-14
sharing link bandwidth32-14
Quality of service
See QoS
queueing32-6, 32-14
R
RADIUS server
configure to-Switch communication28-14
configuring settings28-15
parameters on the switch28-14
range command4-4
range macros
defining4-5
ranges of interfaces
configuring4-4
Rapid Spanning Tree
See RSTP
re-authentication of a client
configuring manual28-17
enabling periodic28-16
reduced MAC address12-2
redundancy (RPR)
configuring36-4
route processor redundancy36-2
supervisor engine and Cisco IOS software36-3
related documentationxxiii
reload command3-15, 3-16
replication
description25-8
reserved-range VLANs
See VLANs
retransmission number
setting in 802.1x authentication28-19
retransmission time
changing in 802.1x authentication28-18
RIP
description1-7
ROM monitor
boot process and3-13
CLI2-6
root bridge
configuring12-9
selecting in MST15-2
root guard
and MST15-2
enabling13-8
overview13-2
routed packets
ACLs26-19
route-map (IP) command24-3
route maps
defining24-3
PBR24-2
route processor redundancy
See redundancy (RPR+)
router ACLs
description26-2
using with VLAN maps26-18
route targets
VPN23-3
Routing Information Protocol
See RIP
RPR+
See redundancy (RPR+)
RSPAN
configuration guidelines34-14
destination ports34-5
IDS34-2
monitored ports34-4
monitoring ports34-5
received traffic34-3
sessions
creating34-15
defined34-3
limiting source traffic to specific VLANs34-21
monitoring VLANs34-20
removing source (monitored) ports34-19
specifying monitored ports34-15
source ports34-4
transmitted traffic34-4
VLAN-based34-5
RSTP
compatibility15-3
description15-2
port roles15-3
port states15-4
S
SAID
See 802.10 SAID
scheduling32-14
defined32-5
overview32-6
secondary root switch12-12
secondary VLANs
associating with primary10-6
description10-2
permitting routing10-10
secure ports, configuring27-1
Security Association Identifier
See 802.10 SAID
servers, VTP
See VTP servers
service-policy command32-29
service-policy input command7-1, 32-34
service-provider networks
and customer VLANs14-2
Layer 2 protocols across14-7
set default interface command24-4
set interface command24-4
set ip default next-hop command24-4
set ip next-hop command24-4
show adjacency command22-9
show boot command3-18
show catalyst4000 chassis-mac-address command12-3
show cdp command17-2, 17-3
show cdp entry command17-4
show cdp interface command17-3
show cdp neighbors command17-4
show cdp traffic command17-4
show ciscoview package command1-15
show ciscoview version command1-15
show configuration command4-8
show debugging command17-4
show environment command35-1
show history command2-4
show interfaces command4-11, 4-12
show interfaces status command5-2
show ip cache flow aggregation destination-prefix command33-9
show ip cache flow aggregation prefix command33-9
show ip cache flow aggregation source-prefix command33-9
show ip cache flow command33-6
show ip cef command22-8
show ip interface command25-15
show ip local policy command24-5
show ip mroute command25-15
show ip pim interface command25-15
show l2protocol command14-11
show mac-address-table address command5-3
show mac-address-table interface command5-3
show mls entry command22-8
show module command5-1, 12-5
show PoE consumed35-22
show power command35-13
show power inline command35-21
show power inline consumption command35-19
show power supplies command35-7
show protocols command4-12
show running-config command
adding description for an interface4-8
checking your settings3-3
displaying ACLs26-12, 26-14, 26-21, 26-22
show startup-config command3-4
show users command5-4
show version command3-16
shutdown, command4-13
shutdown threshold for Layer 2 protocol packets14-9
shutting down
interfaces4-13
single spanning tree
See SST
slot numbers, description4-1
SmartPort macros
configuration guidelines38-4
configuring38-2
creating and applying38-4
default configuration38-2
defined38-1
displaying38-8
tracing38-4
SNMP
documentation1-12
support1-12
software
upgrading36-5
software configuration register3-13
software switching
description22-5
interfaces22-6
key data structures used25-7
SPAN
configuration guidelines34-7
configuring34-6to 34-10
destination ports34-5
IDS34-2
monitored port, defined34-4
monitoring port, defined34-5
received traffic34-3
sessions
defined34-3
source ports34-4
transmitted traffic34-4
VLAN-based34-5
SPAN and RSPAN
concepts and terminology34-3
default configuration34-6
displaying status34-23
overview34-1
session limits34-6
SPAN destination ports
802.1x authentication not supported28-12
SPAN enhancements
configuration example34-14
CPU port sniffing34-10
encapsulation configuration34-12
ingress packets34-12
packet type filtering34-13
spanning-tree backbonefast command13-15
spanning-tree cost command12-15
spanning-tree guard root command13-8
spanning-tree portfast bpdu-guard command13-12
spanning-tree portfast command13-11
spanning-tree port-priority command12-13
spanning-tree uplinkfast command13-14
spanning-tree vlan
command12-9
command example12-9
spanning-tree vlan command12-8
spanning-tree vlan cost command12-15
spanning-tree vlan forward-time command12-19
spanning-tree vlan hello-time command12-17
spanning-tree vlan max-age command12-18
spanning-tree vlan port-priority command12-13
spanning-tree vlan priority command12-17
spanning-tree vlan root primary command12-10
spanning-tree vlan root secondary command12-12
speed
configuring interface4-6
speed command4-7
SST
description15-2
interoperability15-4
static routes
configuring3-5
verifying3-6
statistics
displaying 802.1X28-21
displaying PIM25-20
NetFlow accounting33-6
sticky learning
configuration file27-2
defined27-2
disabling27-2
enabling27-2
saving addresses27-2
sticky MAC addresses
configuring27-4
defined27-2
Storm Control
disabling31-4
displaying31-4
enabling31-3
hardware-based, implementing31-2
overview31-1
STP
bridge ID12-2
configuring12-7to 12-20
creating topology12-4
defaults12-6
disabling12-19
enabling12-7
enabling extended system ID12-8
enabling Per-VLAN Rapid Spanning Tree12-20
forward-delay time12-18
hello time12-17
Layer 2 protocol tunneling14-7
maximum aging time12-18
overview12-1, 12-3
per-VLAN rapid spanning tree12-6
port cost12-15
Port Fast parameter9-3
port priority12-13
root bridge12-9
supervisor engine
configuring3-2to 3-6
copying files to standby36-7
default configuration3-1
default gateways3-4
environmental monitoring35-1
redundancy36-1
ROM monitor3-13
startup configuration3-12
static routes3-5
synchronizing configurations36-4
SVIs
and router ACLs26-3
switched packets
and ACLs26-19
Switched Port Analyzer
See SPAN
switching
NetFlow
configuration (example)33-9
configuring33-5
exporting cache entries33-6
switchport
show interfaces4-11
switchport access vlan command6-6, 6-8
switchport block multicast command30-2
switchport block unicast command30-2
switchport mode access command6-8
switchport mode dot1q-tunnel command14-6
switchport mode dynamic command6-6
switchport mode trunk command6-6
switch ports
See access ports
switchport trunk allowed vlan command6-6
switchport trunk encapsulation command6-6
switchport trunk encapsulation dot1q command6-3
switchport trunk encapsulation isl command6-3
switchport trunk encapsulation negotiate command6-3
switchport trunk native vlan command6-6
switchport trunk pruning vlan command6-6
switch-to-RADIUS server communication
configuring28-14
syslog messages35-2
system
reviewing configuration3-4
settings at startup3-14
system images
loading from Flash memory3-17
modifying boot field3-14
specifying3-17
system MTU
802.1Q tunneling14-5
maximums14-5
T
TACACS+
setting passwords3-8
tagged packets
802.1Q14-3
Layer 2 protocol14-7
Telnet
accessing CLI2-2
disconnecting user sessions5-5
executing5-3
monitoring user sessions5-4
telnet command5-4
time exceeded messages5-7
timer
See login timer
Token Ring
media not supported (note)8-4, 11-3
TOS
description32-4
trace command5-7
traceroute
See IP traceroute
See Layer 2 Traceroute
traceroute mac command5-9
traceroute mac ip command5-9
traffic
blocking flooded30-2
traffic control
using ACLs (figure)26-4
using VLAN maps (figure)26-5
traffic shaping32-15
translational bridge numbers (defaults)8-4
transmit queues
See QoS transmit queues
transmit rate32-40
troubleshooting
with traceroute5-7
trunk ports
802.1x authentication not supported on28-12
configuring PVLAN10-9to 10-10
trunks
802.1Q restrictions6-5
configuring6-6
configuring access VLANs6-6
configuring allowed VLANs6-6
default interface configuration6-6
different VTP domains6-3
enabling to non-DTP device6-4
encapsulation6-3
specifying native VLAN6-6
understanding6-3
trusted boundary for QoS32-24
trust states
configuring32-36
tunneling
defined14-1
Layer 2 protocol14-7
tunnel ports
802.1Q, configuring14-6
described14-1
incompatibilities with other features14-5
type of service
See TOS
U
UDLD
default configuration19-2
disabling19-3
enabling19-3
overview19-1, 29-1
unauthorized ports with 802.1X28-4
unicast
See IP unicast
unicast flood blocking
configuring30-1
unicast traffic
blocking30-2
unidirectional ethernet
enabling7-1
example of setting7-2
overview7-1
UniDirectional Link Detection Protocol
See UDLD
UplinkFast
and MST15-2
enabling13-14
MST and15-3
overview13-5
user EXEC mode2-5
user sessions
disconnecting5-5
monitoring5-4
V
VACLs
Layer 4 port operations26-6
virtual LANs
See VLANs
Virtual Private Network
See VPN
VLAN ACLs
See VLAN maps
vlan command8-6, 8-7
vlan database command8-7
vlan dot1q tag native command14-4
VLAN Management Policy Server
see VMPS
VLAN maps
applying26-14, 26-22
common uses for26-15
configuration example26-15
configuration guidelines26-11
configuring26-10
creating entries26-12
defined26-3
denying access example26-16
denying packets26-12
displaying26-17
examples26-16
order of entries26-11
permitting packets26-12
router ACLs and26-18
using (figure)26-5
VLAN Query Protocol (VQP)9-1
VLANs
allowed on trunk6-6
configuration guidelines8-3
configuring8-4
customer numbering in service-provider networks14-3
default configuration8-4
description1-5
extended range8-3
IDs (default)8-4
interface assignment8-8
limiting source traffic with RSPAN34-21
monitoring with RSPAN34-20
name (default)8-4
normal range8-3
overview8-1
reserved range8-3
See also PVLANs
VLAN Trunking Protocol
See VTP
VLAN trunks
overview6-3
VMPS
administering9-5
dynamic port membership
configuring9-5
overview9-2
reconfirming9-7
in a cluster of switches9-1
monitoring9-5
overview9-1
reconfirming assignments9-7
reconfirming membership interval9-7
voice interfaces
configuring37-1
Voice over IP
configuring37-1
voice ports
configuring VVID37-2
voice traffic35-16, 37-4
VPN
configuring routing in23-5
forwarding23-3
in service provider networks23-1
routes23-2
routing and forwarding table
See VRF
VRF
defining23-3
tables23-1
VTP
configuration guidelines11-5
configuring11-6to 11-10
configuring transparent mode11-9
default configuration11-5
disabling11-9
Layer 2 protocol tunneling14-7
monitoring11-10
overview11-1
See also VTP version 2
VTP advertisements
description11-3
VTP clients
configuring11-8
VTP domains
description11-2
VTP modes11-2
VTP pruning
enabling11-6
overview11-3
VTP servers
configuring11-7
VTP statistics
displaying11-10
VTP version 2
enabling11-7
overview11-3
See also VTP
VVID
configuring37-2