Symbols -
Numerics -
A -
B -
C -
D -
E -
F -
G -
H -
I -
J -
K -
L -
M -
N -
O -
P -
Q -
R -
S -
T -
U -
V -
Index
Symbols
29-13
Numerics
10/100 autonegotiation feature, forced4-7
802.10 SAID (default)8-4
802.1Q
trunks12-6
tunneling
compatibility with other features17-5
defaults17-4
described17-2
tunnel ports with other features17-6
802.1Q VLANs
encapsulation10-3
trunk restrictions10-5
802.1s
See MST
802.1w
See MST
802.1X
See port-based authentication
802.1X authentication
for guest VLANs29-6
RADIUS accounting29-7
with port security29-6
with VLAN assignment29-5
with voice VLAN ports29-10
802.3ad
See LACP
A
AAA
enabling29-13
abbreviating commands2-5
access control entries
See ACEs
access list filtering, SPAN enhancement38-13
access ports
and Layer 2 protocol tunneling17-9
configuring10-8
access VLANs10-6
accounting
configuring for 802.1X29-16
ACEs
ACLs33-2
Ethernet33-2
IP33-2
Layer 4 operation restrictions33-8
ACLs
ACEs33-2
and SPAN38-5
and TCAM programming33-6
applying on routed packets33-21
applying on switched packets33-20
compatibility on the same switch33-3
configuring with VLAN maps33-20
CPU impact33-9
hardware and software support33-5
IP, matching criteria for port ACLs33-4
MAC extended33-11
matching criteria for router ACLs33-3
port
and voice VLAN33-4
defined33-2
limitations33-4
processing33-9
types supported33-2
acronyms, list ofA-1
active queue management27-13
addresses
See MAC addresses
adjacency tables
description22-2
displaying statistics22-9
advertisements, VTP
See VTP advertisements
alarms
major37-2
minor37-2
asymmetrical links, and 802.1Q tunneling17-4
audiencexxi
authentication
See also port-based authentication
authentication server
defined29-3
RADIUS server29-3
authorized and unauthorized ports29-4
authorized ports with 802.1X29-4
autoconfiguration3-2
automatic QoS
See QoS
autonegotiation feature
forced 10/100Mbps4-7
Auto-QoS
configuring27-16
auto-sync command6-8
B
BackboneFast
adding a switch (figure)13-2
and MST14-2
configuring13-15
link failure (figure)13-7, 13-8
not supported MST14-2
understanding13-6
See also STP
BGP1-8
routing session with multi-VRF CE26-6
blocking packets35-1
blocking state (STP)
RSTP comparisons (table)14-4
boot bootldr command3-24
boot command3-21
boot fields
See configuration register boot fields
boot system command3-19, 3-24
boot system flash command3-21
Border Gateway Protocol
See BGP
boundary ports
description14-6
BPDU Guard
and MST14-2
configuring13-12
overview13-4
BPDUs
and media speed12-2
pseudobridges and14-5
what they contain12-3
bridge ID
See STP bridge ID
bridge priority (STP)12-16
bridge protocol data units
See BPDUs
broadcast storm control
disabling36-4
BSR
configuration example23-21
burst rate27-40
burst size27-27
C
candidate switch
defined7-12
requirements7-12
See also command switch and member switch
cautions for passwords
encrypting3-16
TACACS+3-15
CDP
and trusted boundary27-25
configuration18-2
displaying configuration18-3
enabling on interfaces18-3
Layer 2 protocol tunneling17-7
maintaining18-3
monitoring18-3
overview1-2, 18-1
cdp enable command18-3
CEF
adjacency tables22-2
configuring load balancing22-7
displaying statistics22-8
enabling22-6
hardware switching22-4
load balancing22-6
overview22-1
software switching22-4
CGMP
overview16-1
channel-group group command15-7, 15-10
Cisco Discovery Protocol
See CDP
Cisco Express Forwarding
See CEF
Cisco Group Management Protocol
See CGMP
Cisco IOS NSF-awareness support6-2
Cisco IP Phones
configuring28-2
Cisco IP phones
sound quality28-1
CIST
description14-2
class-map command27-28
class of service
See CoS
clear cdp counters command18-4
clear cdp table command18-3
clear counters command4-14
clearing
IP multicast table entries23-20
clear ip flow stats command39-6
CLI
accessing2-1
backing out one level2-5
getting commands2-5
history substitution2-3
managing clusters7-12
modes2-5
monitoring environments38-1
ROM monitor2-6
software basics2-4
clients
in 802.1X authentication29-2
clustering switches
command switch characteristics7-11, 7-12
and VTY7-12
managing
through CLI7-12
overview7-11
planning considerations
CLI7-12
clusters, switch
See also Getting Started with Cisco Network Assistant
command-line processing2-3
command modes2-5
commands
listing2-5
command switch
defined7-11
requirements7-11
See also candidate switch, cluster standby group, member switch, and standby command switch
common and internal spanning tree
See CIST
common spanning tree
See CST
community ports
description34-1
community VLANs
and SPAN features34-4
configure as a PVLAN34-5
description34-1
config-register command3-22
config terminal command3-9
configuration files
obtaining with DHCP3-6
saving3-10
configuration register
boot fields
listing value3-22
modifying3-21
changing settings3-21to 3-22
configuring3-19
settings at startup3-20
configure terminal command3-22, 4-2
console configuration mode2-5
console port
disconnecting user sessions5-5
monitoring user sessions5-4
copy running-config startup-config command3-10
copy system:running-config nvram:startup-config command3-24
CoS
configuring port value27-37
definition27-3
figure27-2
overriding on Cisco IP Phones28-3
priority28-3
CoS-to-DSCP maps27-41
counters
clearing MFIB23-20
clearing on interfaces4-14
CPU port sniffing38-10
CST
description14-5
IST and14-2
MST and14-2
customer edge devices26-2
D
default configuration
802.1X29-12
auto-QoS27-16
IGMP filtering16-17
Layer 2 protocol tunneling17-9
multi-VRF CE26-3
SPAN and RSPAN38-6
default gateway
configuring3-11
verifying configuration3-11
default ports
and support for 802.1X authentication29-13
description command4-9
detecting unidirectional links19-1
DHCP-based autoconfiguration
client request message exchange3-3
configuring
client side3-2
DNS3-5
relay device3-5
server-side3-3
TFTP server3-4
example3-7
lease options
for IP address information3-4
for receiving the configuration file3-4
overview3-2
relationship to BOOTP3-2
DHCP snooping
configuring31-3
default configuration31-3
displaying binding tables31-10
displaying configuration31-10
enabling31-4
enabling on private VLAN31-5
enabling the database agent31-6
monitoring31-9, 31-13, 31-14
overview31-1
Snooping database agent31-2
DHCP Snooping Database Agent
adding to the database (example)31-9
enabling (example)31-6
overview31-2
reading from a TFTP file (example)31-8
Differentiated Services Code Point values
See DSCP values
DiffServ architecture, QoS27-2
disabled state
RSTP comparisons (table)14-4
disabling
broadcast storm control36-4
disconnect command5-5
DNS
and DHCP-based autoconfiguration3-5
documentation
organizationxxi
relatedxxiii
double-tagged packets
802.1Q tunneling17-2
Layer 2 protocol tunneling17-9
drop threshold for Layer 2 protocol packets17-9
DSCP maps27-41
DSCP-to-CoS maps
configuring27-43
DSCP values
configuring maps27-41
configuring port value27-38
definition27-3
IP precedence27-2
mapping markdown27-23
mapping to transmit queues27-39
DTP
VLAN trunks and10-3
duplex command4-8
duplex mode
configuring interface4-7
Dynamic Host Configuration Protocol snooping
See DHCP snooping
dynamic port VLAN membership
limit on hosts9-9
reconfirming9-7
troubleshooting9-9
Dynamic Trunking Protocol
See DTP
E
EAP
request/identity frame29-3
response/identity frame29-3
EAP frames
changing retransmission time29-20
exchanging (figure)29-4
setting retransmission number29-21
EAPOL frame
start29-3
EAPOL frames
802.1X authentication and29-2
OTP authentication, example (figure)29-4
edge ports
description14-7
EGP
overview1-8
EIGRP
overview1-8
Embedded CiscoView
displaying information1-16
installing and configuring1-14
overview1-13
enable command3-9, 3-21
enable mode2-5
encapsulation types10-3
Enhanced Interior Gateway Routing Protocol
See EIGRP
environmental monitoring
LED indications37-2
SNMP traps37-2
supervisor engine37-2
switching modules37-2
using CLI commands37-1
EtherChannel
channel-group group command15-7, 15-10
configuration guidelines15-5
configuring15-6to 15-14
configuring Layer 215-9
configuring Layer 315-6
interface port-channel command15-7
lacp system-priority
command example15-12
modes15-3
overview15-1
PAgP
Understanding15-3
physical interface configuration15-7
port-channel interfaces15-2
port-channel load-balance command15-12
removing15-14
removing interfaces15-13
EtherChannel ports
802.1X authentication not supported in29-13
explicit host tracking
enabling16-8
extended range VLANs
See VLANs
Extensible Authentication Protocol over LAN29-2
Exterior Gateway Protocol
See EGP
F
FastDrop
clearing entries23-20
displaying entries23-19
overview23-10
FIB
description22-2
See also MFIB
filtering
in a VLAN33-12
non-IP traffic33-11
flags23-11
Flash memory
configuring router to boot from3-24
loading system images from3-23
security precautions3-23
flooded traffic, blocking35-2
For9-4
forward-delay time (STP)
configuring12-18
forwarding information base
See FIB
G
gateway
See default gateway
global configuration mode2-5
Guest-VLANs
configure with 802.1X29-17, 29-18
H
hardware and software ACL support33-5
hardware switching22-5
hello time (STP)
configuring12-17
history
CLI2-3
hop counts
configuring MST bridges14-7
host
configuring host statically16-8
limit on dynamic port9-9
Hot Standby Routing Protocol
See HSRP
HSRP
description1-6
hw-module module num power command37-15
I
ICMP
enabling5-10
ping5-5
running IP traceroute5-7
time exceeded messages5-7
IDS
using with SPAN and RSPAN38-2
IEEE 802.1s
See MST
IEEE 802.1w
See MST
IEEE 802.3ad
See LACP
IGMP
description23-3
enabling23-13
explicit host tracking16-3, 16-8
immediate-leave processing16-3
overview16-1
IGMP filtering
configuring16-17
default configuration16-17
described16-16
monitoring16-20
IGMP groups
setting the maximum number16-19
IGMP profile
applying16-18
configuration mode16-17
configuring16-17
IGMP snooping
configuration guidelines16-4
enabling16-5
IP multicast and23-4
monitoring16-11
overview16-1
IGRP
description1-8
immediate-leave processing
enabling16-7
IGMP
See fast-leave processing
ingress packets, SPAN enhancement38-12
inline power
configuring on Cisco IP phones28-4
See PoE
Intelligent Power Management37-17, 37-20
interface command3-9, 4-1
interface port-channel command15-7
interface range command4-4
interface range macro command4-5
interfaces
adding descriptive name4-9
clearing counters4-14
configuring4-2
configuring ranges4-4
displaying information about4-13
Layer 2 modes10-4
maintaining4-13
monitoring4-13
naming4-9
numbers4-2
overview4-1
restarting4-14
See also Layer 2 interfaces
Interior Gateway Routing Protocol
See IGRP
Internet Control Message Protocol
See ICMP
Internet Group Management Protocol
See IGMP
Inter-Switch Link encapsulation
See ISL encapsulation
Intrusion Detection System
See IDS
IP
configuring default gateway3-11
configuring static routes3-11
displaying statistics22-8
flow switching cache39-6
IP addresses
candidate or member7-12
command switch7-11
See also IP information
ip cef command22-6
ip flow-aggregation cache destination-prefix command39-8
ip flow-aggregation cache prefix command39-8
ip flow-aggregation cache source-prefix command39-8
ip flow-export command39-6
ip icmp rate-limit unreachable command5-11
ip igmp profile command16-17
ip igmp snooping tcn flood command16-10
ip igmp snooping tcn flood query count command16-10
ip igmp snooping tcn query solicit command16-11
IP information
assigned
through DHCP-based autoconfiguration3-2
ip load-sharing per-destination command22-7
ip local policy route-map command24-5
ip mask-reply command5-12
IP multicast
clearing table entries23-20
configuring23-12
default configuration23-13
displaying PIM information23-15
displaying the routing table information23-16
enabling23-13
enabling dense-mode PIM23-14
enabling sparse-mode23-14
features not supported23-12
hardware forwarding23-8
IGMP snooping and16-4, 23-4
monitoring23-15
overview23-1
routing protocols23-2
software forwarding23-8
See also Auto-RP; IGMP; PIM; RP; RPF
ip multicast-routing command23-13
IP phones
automatic classification and queueing27-16
configuring voice ports28-2
See Cisco IP Phones28-1
trusted boundary for QoS27-25
ip pim command23-14
ip pim dense-mode command23-14
ip pim sparse-dense-mode command23-15
ip policy route-map command24-4
ip redirects command5-11
ip route-cache flow command39-5
IP routing tables
deleting entries23-20
IP Source Guard
configuring31-11
configuring on private VLANs31-12
displaying31-13, 31-14
overview31-10
IP statistics
displaying22-8
IP traceroute
executing5-7
overview5-7
IP unicast
displaying statistics22-8
ip unreachables command5-10
IPX
redistribution of route information with EIGRP1-8
ISL
encapsulation10-3
trunking with 802.1Q tunneling17-4
isolated ports
description34-1
isolated VLANs
description34-1
IST
description14-2
MST regions and14-2
IST master
description14-7
J
jumbo frames
and ethernet ports4-11
configuring MTU sizes for4-12
ports and linecards that support4-10
VLAN interfaces4-11
K
keyboard shortcuts2-3
L
l2protocol-tunnel command17-11
labels
definition27-3
LACP
system ID15-4
Layer 2 access ports10-8
Layer 2 frames
classification with CoS27-2
Layer 2 interfaces
assigning VLANs8-8
configuring10-5
configuring as PVLAN host ports34-8
configuring as PVLAN promiscuous ports34-7
configuring as PVLAN trunk ports34-9
defaults10-5
disabling configuration10-9
modes10-4
show interfaces command10-7
Layer 2 interface type
resetting34-12
setting34-12
Layer 2 protocol tunneling
configuring17-9
default configuration17-9
defined17-7
guidelines17-10
Layer 2 switching
overview10-1
Layer 2 Traceroute
and ARP5-9
and CDP5-8
described5-8
host-to-host paths5-8
IP addresses and subnets5-9
MAC addresses and VLANs5-9
multicast traffic5-9
multiple devices on a port5-9
unicast traffic1-3, 5-8
usage guidelines5-8
Layer 2 trunks
configuring10-6
overview10-3
Layer 3 packets
classification methods27-2
Layer 4 port operations
configuration guidelines33-8
restrictions33-8
LEDs
description (table)37-2
listening state (STP)
RSTP comparisons (table)14-4
load balancing
configuring for CEF22-7
configuring for EtherChannel15-12
overview15-5, 22-6
per-destination22-7
login timer
changing5-4
logoutwarning command5-4
loop guard
and MST14-2
configuring13-9
overview13-2
M
MAC addresses
allocating12-5
building tables10-2
convert dynamic to sticky secure30-2
displaying5-3
displaying in DHCP snooping binding table31-10
in ACLs33-11
sticky30-2
sticky secure, adding30-2
MAC extended access lists33-11
macros
See SmartPort macros
main-cpu command6-8
mapping
DSCP markdown values27-23
DSCP values to transmit queues27-39
mapping tables
configuring DSCP27-41
described27-13
mask destination command39-8
mask source command39-8
match ip address command24-3
maximum aging time (STP)
configuring12-18
member switch
defined7-11
managing7-12
requirements7-12
See also candidate switch, cluster standby group, and standby command switch
metro tags17-2
MFIB
CEF23-5
displaying23-18
overview23-11
modules
checking status5-1
powering down37-15
monitoring
802.1Q tunneling17-12
ACL information33-28
IGMP filters16-20
IGMP snooping16-11
Layer 2 protocol tunneling17-12
multi-VRF CE26-11
tunneling17-12
VLAN filters33-19
VLAN maps33-19
M-record14-2
MST
and multiple spanning trees1-4, 14-2
boundary ports14-6
BPDUs14-2
configuration parameters14-5
configuring14-9
displaying configurations14-13
edge ports14-7
enabling14-9
hop count14-7
instances
configuring parameters14-12
description14-2
number supported14-5
interoperability with PVST+14-2
link type14-7
master14-7
message age14-7
regions14-5, 14-6
restrictions14-8
to-SST interoperability14-4
MSTP
M-record14-2
M-tree14-2
M-tree14-2
MTU size
configuring4-12
MTU size (default)8-4
multicast
See IP multicast
multicast packets
blocking35-2
multicast routers
displaying routing tables23-16
flood suppression16-9
Multicast Storm Control
overview36-6
suppression on WS-X401436-7
suppression on WS-X401636-6
multiple forwarding paths1-4, 14-2
Multiple Spanning Tree
See MST
multiple VPN routing/forwarding in customer edge devices
See multi-VRF CE
multi-VRF CE
components26-3
configuration example26-7
default configuration26-3
defined26-1
displaying26-11
monitoring26-11
network components26-3
packet-forwarding process26-3
N
native VLAN
and 802.1Q tunneling17-4
specifying10-6
NetFlow
aggregation
minimum mask,default value39-8
destination-prefix aggregation
configuration (example)39-13
minimum mask, configuring39-8
IP
flow switching cache39-6
prefix aggregation
configuration (example)39-10
minimum mask, configuring39-8
source-prefix aggregation
minimum mask, configuring39-8
switching
configuration (example)39-9
configuring39-5
exporting cache entries39-6
statistics39-6
NetFlow statistics
caveats on supervisor39-4
configuring collection39-4
implementing collection39-4
overview of collection39-1
Network Assistant
and VTY7-12
configure
display configuration7-9
enable communication with switch7-4
enable inter-cluster communication7-7
connect to a device7-10
default configuration7-3
installation requirements7-2
installing7-3
launch7-10
overview of CLI commands7-4
software and hardware requirements7-2
understanding7-1
network fault tolerance1-4, 14-2
network management
configuring18-1
Next Hop Resolution Protocol
See NHRP
NFFC/NFFC II
IGMP snooping and16-4
NHRP
support1-8
non-IP traffic filtering33-11
non-RPF traffic
description23-9
in redundant configurations (figure)23-10
nonvolatile random-access memory
See NVRAM
normal-range VLANs
See VLANs
NSF-awareness support6-2
NVRAM
saving settings3-10
O
OIR
overview4-13
online insertion and removal
See OIR
Open Shortest Path First
See OSPF
operating system images
See system images
OSPF
area concept1-7
description1-7
P
packets
modifying27-15
software processed
and QoS27-15
packet type filtering38-14
packet type filtering, SPAN enhancement38-14
PAgP
understanding15-3
passwords
configuring enable password3-14
configuring enable secret password3-14
encrypting3-15
recovering lost enable password3-18
setting line password3-14
setting TACACS+3-15
PBR (policy-based routing)
configuration (example)24-5
enabling24-3
features24-2
overview24-1
route maps24-2
when to use24-2
per-port and VLAN Access Control List31-10
Per-VLAN Rapid Spanning Tree12-6
enabling12-20
overview12-6
PE to CE routing, configuring26-6
PIM
configuring dense mode23-14
configuring sparse mode23-14
displaying information23-15
displaying statistics23-20
enabling sparse-dense mode23-14, 23-15
overview23-3
PIM-DM23-3
PIM-SM23-3
ping
executing5-6
overview5-5
ping command5-6, 23-15
PoE37-21
configuring37-15
configuring power consumption for single device37-19
configuring power consumption for switch37-18
power consumption for powered devices
Intelligent Power Management37-20
overview37-17
powering down a module37-15
power management modes37-16
show interface status37-20
point-to-point
in 802.1X authentication (figure)29-2, 29-8
police command27-32
policed-DSCP map27-42
policers
description27-5
number of27-10
types of27-9
policies
See QoS policies
policing
See QoS policing
policy-map command27-29, 27-31
policy maps
attaching to interfaces27-34
configuring27-30
port ACLs
and voice VLAN33-4
defined33-2
limitations33-4
Port Aggregation Protocol
see PAgP
port-based authentication
changing the quiet period29-19
client, defined29-2
configuration guidelines29-13
configure 802.1X accounting29-16
configure switch-to-RADIUS server communication29-15
configure with Guest-VLANs29-17, 29-18
configuring Guest-VLAN29-15
configuring manual re-authentication of a client29-19
controlling authorization state29-4
default configuration29-12
described29-2
device roles29-2
disabling29-14
displaying statistics29-22
enabling29-13
802.1X with voice VLAN29-10
enabling multiple hosts29-21
enabling periodic re-authentication29-18
encapsulation29-2
initiation and message exchange29-3
method lists29-13
ports not supported29-4
resetting to default values29-22
setting retransmission number29-21
setting retransmission time29-20
topologies, supported29-10
using with port security29-6
with VLAN assignment29-5
port-based QoS features
See QoS
port-channel interfaces
See also EtherChannel
creating15-6
overview15-2
port-channel load-balance
command15-12
command example15-12
port-channel load-balance command15-12
port cost (STP)
configuring12-15
PortFast
and MST14-2
BPDU filter, configuring13-12
configuring or enabling13-11
overview13-3
PortFast BPDU filtering
and MST14-2
enabling13-12
overview13-4
port priority
configuring MST instances14-12
configuring STP12-13
ports
blocking35-1
checking status5-2
community34-1
dynamic VLAN membership
reconfirming9-7
forwarding, resuming35-3
isolated34-1
PVLAN types34-1
secure30-1
See also interfaces
port security
aging30-6
and QoS trusted boundary27-25
configuring30-4
default configuration30-3
described30-1
displaying30-7
RADIUS accounting29-7
sticky learning30-2
using with 802.1X29-6
violations30-2
with other features30-3
port states
description12-5
port trust state
See trust states
power, inline28-4
power dc input command37-11
power inline command37-16
power inline consumption command37-18, 37-19
power management
1+1 redundancy mode37-11
2+1 redundancy mode37-11
Catalyst 4006 switch37-11
Catalyst 4500 series37-4
Catalyst 4500 Series power supplies37-9
Catalyst 4948 series37-3
combined mode37-5
configuring combined mode37-8
configuring redundant mode37-7
overview37-1
redundancy37-11
redundant mode37-5
power over Ethernet
See PoE
power redundancy
setting on Catalyst 400637-14
power redundancy-mode command37-8
power supplies
fixed37-4
variable37-3, 37-4
power supplies required command37-14
primary VLANs
associating with secondary VLANs34-6
configuring as a PVLAN34-5
description34-1
priority
overriding CoS of incoming frames28-3
privileged EXEC mode2-5
privileges
changing default3-17
configuring levels3-16
exiting3-17
logging in3-17
promiscuous ports
configuring PVLAN34-7
description34-1
setting mode34-12
protocol timers12-4
provider edge devices26-2
pruning, VTP
See VTP pruning
pseudobridges
description14-5
PVACL31-10
PVID (port VLAN ID)
and 802.1X with voice VLAN ports29-10
PVLANs
802.1q support34-5
configuration guidelines34-3
configuring34-3
configuring a VLAN as34-5
configuring promiscuous ports34-7
host port
configuring a Layer 2 interface34-8
host ports
setting34-12
isolated VLANs34-1
overview34-1
permitting routing, example34-11
promiscuous mode
setting34-12
setting
interface mode34-12
Q
QoS
allocating bandwidth27-40
and software processed packets27-15
auto-QoS
configuration and defaults display27-19
configuration guidelines27-18
described27-16
displaying27-19
effects on NVRAM configuration27-17
enabling for VoIP27-18
basic model27-5
burst size27-27
classification27-5to 27-9
configuration guidelines27-24
auto-QoS27-18
configuring
auto-QoS27-16
DSCP maps27-41
traffic shaping27-40
trusted boundary27-25
VLAN-based27-35
creating policing rules27-28
default auto configuration27-16
default configuration27-22
definitions27-3
disabling on interfaces27-34
enabling on interfaces27-34
flowcharts27-7, 27-11
IP phones
automatic classification and queueing27-16
detection and trusted settings27-16, 27-25
overview27-1
packet modification27-15
port-based27-35
priority27-14
traffic shaping27-14
transmit rate27-40
trust states
trusted device27-25
VLAN-based27-35
See also COS; DSCP values; transmit queues
QoS active queue management
tracking queue length27-13
QoS labels
definition27-3
QoS mapping tables
CoS-to-DSCP27-41
DSCP-to-CoS27-43
policed-DSCP27-42
types27-13
QoS marking
description27-4
QoS policers
burst size27-27
numbers of27-10
types of27-9
QoS policing
definition27-4
described27-5, 27-9
QoS policy
attaching to interfaces27-10
overview of configuration27-28
QoS transmit queues
allocating bandwidth27-40
burst27-14
configuring27-39
configuring traffic shaping27-40
mapping DHCP values to27-39
maximum rate27-14
overview27-13
sharing link bandwidth27-14
Quality of service
See QoS
queueing27-5, 27-13
R
RADIUS server
configure to-Switch communication29-15
configuring settings29-16
parameters on the switch29-15
range command4-4
range macros
defining4-5
ranges of interfaces
configuring4-4
Rapid Spanning Tree
See RSTP
rcommand command7-12
re-authentication of a client
configuring manual29-19
enabling periodic29-18
reduced MAC address12-2
redundancy
configuring6-8
guidelines and restrictions6-7
changes made through SNMP6-8, 6-11
NSF-awareness support6-2
overview6-3
redundancy command6-8
understanding synchronization6-6
redundancy(RPR)
route processor redundancy6-4
synchronization6-6
redundancy(SSO)
route processor redundancy6-4
synchronization6-7
related documentationxxiii
reload command3-21, 3-22
replication
description23-8
reserved-range VLANs
See VLANs
retransmission number
setting in 802.1X authentication29-21
retransmission time
changing in 802.1X authentication29-20
RIP
description1-7
ROM monitor
boot process and3-19
CLI2-6
root bridge
configuring12-9
selecting in MST14-2
root guard
and MST14-2
enabling13-8
overview13-2
routed packets
ACLs33-21
route-map (IP) command24-3
route maps
defining24-3
PBR24-2
router ACLs
description33-2
using with VLAN maps33-20
route targets
VPN26-3
Routing Information Protocol
See RIP
RSPAN
configuration guidelines38-16
destination ports38-5
IDS38-2
monitored ports38-4
monitoring ports38-5
received traffic38-3
sessions
creating38-17
defined38-3
limiting source traffic to specific VLANs38-23
monitoring VLANs38-22
removing source (monitored) ports38-21
specifying monitored ports38-17
source ports38-4
transmitted traffic38-4
VLAN-based38-5
RSTP
compatibility14-3
description14-2
port roles14-3
port states14-4
S
SAID
See 802.10 SAID
scheduling27-13
defined27-4
overview27-5
secondary root switch12-12
secondary VLANs
associating with primary34-6
description34-2
permitting routing34-11
secure ports, configuring30-1
Security Association Identifier
See 802.10 SAID
servers, VTP
See VTP servers
service-policy command27-29
service-policy input command20-1, 27-34
service-provider networks
and customer VLANs17-2
Layer 2 protocols across17-7
set default interface command24-4
set interface command24-4
set ip default next-hop command24-4
set ip next-hop command24-4
show adjacency command22-9
show boot command3-24
show catalyst4000 chassis-mac-address command12-3
show cdp command18-2, 18-3
show cdp entry command18-4
show cdp interface command18-3
show cdp neighbors command18-4
show cdp traffic command18-4
show ciscoview package command1-16
show ciscoview version command1-16
show cluster members command7-12
show configuration command4-9
show debugging command18-4
show environment command37-1
show history command2-4
show interfaces command4-12, 4-13
show interfaces status command5-2
show ip cache flow aggregation destination-prefix command39-9
show ip cache flow aggregation prefix command39-9
show ip cache flow aggregation source-prefix command39-9
show ip cache flow command39-6
show ip cef command22-8
show ip interface command23-15
show ip local policy command24-5
show ip mroute command23-15
show ip pim interface command23-15
show l2protocol command17-11
show mac-address-table address command5-3
show mac-address-table interface command5-3
show mls entry command22-8
show module command5-1, 12-5
show PoE consumed37-21
show power command37-14
show power inline command37-20
show power inline consumption command37-19
show power supplies command37-8
show protocols command4-13
show running-config command
adding description for an interface4-9
checking your settings3-9
displaying ACLs33-14, 33-16, 33-23, 33-24
show startup-config command3-10
show users command5-4
show version command3-22
shutdown, command4-14
shutdown threshold for Layer 2 protocol packets17-9
shutting down
interfaces4-14
single spanning tree
See SST
slot numbers, description4-2
SmartPort macros
configuration guidelines11-4
configuring11-2
creating and applying11-4
default configuration11-2
defined11-1
displaying11-8
tracing11-4
SNMP
documentation1-12
support1-12
software
upgrading6-12
software configuration register3-19
software switching
description22-5
interfaces22-6
key data structures used23-7
SPAN
and ACLs38-5
configuration guidelines38-7
configuring38-6to 38-10
destination ports38-5
IDS38-2
monitored port, defined38-4
monitoring port, defined38-5
received traffic38-3
sessions
defined38-3
source ports38-4
transmitted traffic38-4
VLAN-based38-5
SPAN and RSPAN
concepts and terminology38-3
default configuration38-6
displaying status38-24
overview38-1
session limits38-6
SPAN destination ports
802.1X authentication not supported29-13
SPAN enhancements
access list filtering38-13
configuration example38-15
CPU port sniffing38-10
encapsulation configuration38-12
ingress packets38-12
packet type filtering38-14
spanning-tree backbonefast command13-15
spanning-tree cost command12-15
spanning-tree guard root command13-8
spanning-tree portfast bpdu-guard command13-12
spanning-tree portfast command13-11
spanning-tree port-priority command12-13
spanning-tree uplinkfast command13-14
spanning-tree vlan
command12-9
command example12-9
spanning-tree vlan command12-8
spanning-tree vlan cost command12-15
spanning-tree vlan forward-time command12-19
spanning-tree vlan hello-time command12-17
spanning-tree vlan max-age command12-18
spanning-tree vlan port-priority command12-13
spanning-tree vlan priority command12-17
spanning-tree vlan root primary command12-10
spanning-tree vlan root secondary command12-12
speed
configuring interface4-7
speed command4-7
SST
description14-2
interoperability14-4
static routes
configuring3-11
verifying3-12
statistics
displaying 802.1X29-22
displaying PIM23-20
NetFlow accounting39-6
sticky learning
configuration file30-2
defined30-2
disabling30-2
enabling30-2
saving addresses30-2
sticky MAC addresses
configuring30-4
defined30-2
Storm Control
disabling36-4
displaying36-4
enabling36-3
hardware-based, implementing36-2
overview36-1
STP
bridge ID12-2
configuring12-7to 12-20
creating topology12-4
defaults12-6
disabling12-19
enabling12-7
enabling extended system ID12-8
enabling Per-VLAN Rapid Spanning Tree12-20
forward-delay time12-18
hello time12-17
Layer 2 protocol tunneling17-7
maximum aging time12-18
overview12-1, 12-3
per-VLAN rapid spanning tree12-6
port cost12-15
port priority12-13
root bridge12-9
supervisor engine
accessing the redundant6-15
configuring3-8to 3-13
copying files to standby6-15
default configuration3-1
default gateways3-11
environmental monitoring37-1
ROM monitor3-19
startup configuration3-18
static routes3-11
synchronizing configurations6-10
SVIs
and router ACLs33-3
switched packets
and ACLs33-20
Switched Port Analyzer
See SPAN
switching
NetFlow
configuration (example)39-9
configuring39-5
exporting cache entries39-6
switchport
show interfaces4-12
switchport access vlan command10-6, 10-8
switchport block multicast command35-2
switchport block unicast command35-2
switchport mode access command10-8
switchport mode dot1q-tunnel command17-6
switchport mode dynamic command10-6
switchport mode trunk command10-6
switch ports
See access ports
switchport trunk allowed vlan command10-6
switchport trunk encapsulation command10-6
switchport trunk encapsulation dot1q command10-3
switchport trunk encapsulation isl command10-3
switchport trunk encapsulation negotiate command10-3
switchport trunk native vlan command10-6
switchport trunk pruning vlan command10-6
switch-to-RADIUS server communication
configuring29-15
syslog messages37-2
system
reviewing configuration3-10
settings at startup3-20
system images
loading from Flash memory3-23
modifying boot field3-20
specifying3-23
system MTU
802.1Q tunneling17-5
maximums17-5
T
TACACS+
setting passwords3-15
tagged packets
802.1Q17-3
Layer 2 protocol17-7
TCAM programming and ACLs33-6
Telnet
accessing CLI2-2
disconnecting user sessions5-5
executing5-3
monitoring user sessions5-4
telnet command5-4
TFTP
configuration files in base directory3-5
configuring for autoconfiguration3-4
time exceeded messages5-7
timer
See login timer
Token Ring
media not supported (note)8-4, 25-3
TOS
description27-3
trace command5-7
traceroute
See IP traceroute
See Layer 2 Traceroute
traceroute mac command5-9
traceroute mac ip command5-9
traffic
blocking flooded35-2
traffic control
using ACLs (figure)33-4
using VLAN maps (figure)33-5
traffic shaping27-14
translational bridge numbers (defaults)8-4
transmit queues
See QoS transmit queues
transmit rate27-40
troubleshooting
with traceroute5-7
trunk ports
802.1X authentication not supported on29-13
configuring PVLAN34-9to 34-11
trunks
802.1Q restrictions10-5
configuring10-6
configuring access VLANs10-6
configuring allowed VLANs10-6
default interface configuration10-6
different VTP domains10-3
enabling to non-DTP device10-4
encapsulation10-3
specifying native VLAN10-6
understanding10-3
trusted boundary for QoS27-25
trust states
configuring27-36
tunneling
defined17-1
Layer 2 protocol17-7
tunnel ports
802.1Q, configuring17-6
described17-2
incompatibilities with other features17-5
type of service
See TOS
U
UDLD
default configuration19-2
disabling19-3
enabling19-3
overview19-1, 32-1
unauthorized ports with 802.1X29-4
unicast
See IP unicast
unicast flood blocking
configuring35-1
unicast traffic
blocking35-2
unidirectional ethernet
enabling20-1
example of setting20-2
overview20-1
UniDirectional Link Detection Protocol
See UDLD
UplinkFast
and MST14-2
enabling13-14
MST and14-3
overview13-5
user EXEC mode2-5
user sessions
disconnecting5-5
monitoring5-4
V
VACLs
Layer 4 port operations33-7
virtual LANs
See VLANs
Virtual Private Network
See VPN
VLAN ACLs
See VLAN maps
vlan command8-6, 8-7
vlan database command8-7
vlan dot1q tag native command17-4
VLAN Management Policy Server
See VMPS
VLAN maps
applying33-16, 33-24
common uses for33-16
configuration example33-17
configuration guidelines33-13
configuring33-12
creating entries33-13
defined33-3
denying access example33-18
denying packets33-14
displaying33-19
examples33-18
order of entries33-13
permitting packets33-14
router ACLs and33-20
using (figure)33-5
VLANs
allowed on trunk10-6
configuration guidelines8-3
configuring8-4
customer numbering in service-provider networks17-3
default configuration8-4
description1-5
extended range8-3
IDs (default)8-4
interface assignment8-8
limiting source traffic with RSPAN38-23
monitoring with RSPAN38-22
name (default)8-4
normal range8-3
overview8-1
reserved range8-3
See also PVLANs
VLAN Trunking Protocol
See VTP
VLAN trunks
overview10-3
VMPS
configuring dynamic access ports on client9-6
configuring retry interval9-8
dynamic port membership
reconfirming9-7
reconfirming assignments9-7
reconfirming membership interval9-7
server overview9-1
VMPS client
administering and monitoring9-8
configure switch
configure reconfirmation interval9-7
dynamic ports9-6
entering IP VMPS address9-5
reconfirmation interval9-8
reconfirm VLAM membership9-7
default configuration9-4
dynamic VLAN membership overview9-4
troubleshooting dynamic port VLAN membership9-9
VMPS server
fall-back VLAN9-3
illegal VMPS client requests9-3
overview9-1
security modes
multiple9-3
open9-2
secure9-3
voice interfaces
configuring28-1
Voice over IP
configuring28-1
voice ports
configuring VVID28-2
voice traffic28-4, 37-15
voice VLAN ports
using 802.1X29-10
VPN
configuring routing in26-5
forwarding26-3
in service provider networks26-1
routes26-2
routing and forwarding table
See VRF
VRF
defining26-3
tables26-1
VTP
configuration guidelines25-5
configuring25-6to 25-10
configuring transparent mode25-9
default configuration25-5
disabling25-9
Layer 2 protocol tunneling17-7
monitoring25-10
overview25-1
See also VTP version 2
VTP advertisements
description25-3
VTP clients
configuring25-8
VTP domains
description25-2
VTP modes25-2
VTP pruning
enabling25-6
overview25-3
VTP servers
configuring25-7
VTP statistics
displaying25-10
VTP version 2
enabling25-7
overview25-3
See also VTP
VTY and Network Assistant7-12
VVID (voice VLAN ID)
and 802.1X authentication29-10
configuring28-2