Preface


This preface describes who should read this document, how it is organized, and its conventions. The preface also tells you how to obtain Cisco documents, as well as how to obtain technical assistance.

Audience

This guide is for experienced network administrators who are responsible for configuring and maintaining Catalyst 4500 series switches.

Organization

This guide is organized into the following chapters:

Chapter
Title
Description

Chapter 1

Product Overview

Presents an overview of the Cisco IOS software for the Catalyst 4500 series switches

Chapter 2

Command-Line Interfaces

Describes how to use the CLI

Chapter 3

Configuring the Switch for the First Time

Describes how to perform a baseline configuration of the switch

Chapter 4

Administering the Switch

Describes how to administer the switch.

Chapter 5

Configuring the Cisco IOS In Service Software Upgrade Process

Describes how to configure ISSU on the switch.

Chapter 6

Configuring Interfaces

Describes how to configure non-layer-specific features on Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet interfaces

Chapter 7

Checking Port Status and Connectivity

Describes how to check module and interface status

Chapter 8

Configuring Supervisor Engine Redundancy Using RPR and SSO

Describes how to configure RPR and SSO on the Catalyst 4507R and 4510R switches

Chapter 9

Configuring Cisco NSF with SSO Supervisor Engine Redundancy

Describes how to configure supervisor engine redundancy using Cisco nonstop forwarding (NSF) with stateful switchover (SSO).

Chapter 10

Environmental Monitoring and Power Management

Describes how to configure power management and environmental monitoring features

Chapter 11

Configuring Power over Ethernet

Describes how to configure Power over Ethernet (PoE)

Chapter 12

Configuring the Catalyst 4500 Series Switch with Cisco Network Assistant

Describes how to install and configure Network Assistant and Embedded CiscoView

Chapter 13

Configuring VLANs, VTP, and VMPS

Describes how to configure VLANs, VTP, and VMPS.

Chapter 14

Configuring IP Unnumbered Interface

Describes how to configure IP Unnumbered support.

Chapter 15

Configuring Layer 2 Ethernet Interfaces

Describes how to configure interfaces to support Layer 2 features, including VLAN trunks

Chapter 16

Configuring SmartPort Macros

Describes how to configure SmartPort macros

Chapter 17

Configuring STP and MST

Describes how to configure the Spanning Tree Protocol (STP) and the Multiple Spanning Tree (MST) protocol and explains how they work.

Chapter 18

Configuring Resilient Ethernet Protocol

Describes how to configure Resilient Ethernet Protocol (REP).

Chapter 19

Configuring Optional STP Features

Describes how to configure the spanning-tree PortFast, UplinkFast, BackboneFast, and other STP features

Chapter 20

Configuring EtherChannel

Describes how to configure Layer 2 and Layer 3 EtherChannel port bundles

Chapter 21

Configuring IGMP Snooping and Filtering

Describes how to configure Internet Group Management Protocol (IGMP) snooping

Chapter 22

Configuring IPv6 MLD Snooping

Describes how to configure IPv6 MLD Snooping.

Chapter 23

Configuring 802.1Q and Layer 2 Protocol Tunneling

Describes how to configure 802.1Q and Layer 2 protocol Tunneling

Chapter 24

Configuring CDP

Describes how to configure the Cisco Discovery Protocol (CDP)

Chapter 25

Configuring LLDP and LLDP-MED

Describes how to configure Link Layer Discovery Protocol (LLDP).

Chapter 26

Configuring UDLD

Describes how to configure the UniDirectional Link Detection (UDLD) protocol

Chapter 31

Configuring Unidirectional Ethernet

Describes how to configure unidirectional Ethernet

Chapter 27

Configuring Layer 3 Interfaces

Describes how to configure interfaces to support Layer 3 features

Chapter 28

Configuring Cisco Express Forwarding

Describes how to configure Cisco Express Forwarding (CEF) for IP unicast traffic

Chapter 29

Configuring Unicast Reverse Path Forwarding

Describes how to configure Unicast Reverse Path Forwarding.

Chapter 32

Configuring IP Multicast

Describes how to configure IP Multicast Multilayer Switching (MMLS)

Chapter 33

Configuring Policy-Based Routing

Describes how to configure policy-based routing

Chapter 34

Configuring VRF-lite

Describes how to configure multiple VPN routing/forwarding (multi-VRF) instances in customer edge (CE) devices

Chapter 35

Configuring Quality of Service

Describes how to configure quality of service (QoS)

Chapter 36

Configuring Voice Interfaces

Describes how to configure voice interfaces

Chapter 36

Configuring Private VLANs

Describes how to set up and modify private VLANs

Chapter 37

Configuring 802.1X Port-Based Authentication

Describes how to configure 802.1X port-based authentication

Chapter 38

Configuring Port Security

Describes how to configure port security and trunk port security

Chapter 1

Configuring Control Plane Policing

Describes how to protect your Catalyst 4500 series switch using control plane policing (CoPP)

Chapter 39

Configuring DHCP Snooping, IP Source Guard, and IPSG for Static Hosts

Describes how to configure DHCP snooping and IP Source Guard

Chapter 41

Configuring Dynamic ARP Inspection

Describes how to configure Dynamic ARP Inspection

Chapter 42

Configuring Network Security with ACLs

Describes how to configure ACLS, VACLs, and MACLs

Chapter 43

Port Unicast and Multicast Flood Blocking

Describes how to configure unicast flood blocking

Chapter 44

Configuring Storm Control

Describes how to configure storm control suppression

Chapter 45

Configuring SPAN and RSPAN

Describes how to configure the Switched Port Analyzer (SPAN)

Chapter 46

Configuring System Message Logging

Describes how to configure system message logging.

Chapter 47

Configuring SNMP

Describes how to configure the Simple Network Management Protocol (SNMP).

Chapter 48

Configuring NetFlow

Describes how to configure NetFlow statistics gathering

Chapter 50

Configuring RMON

Describes how to configure Remote Network Monitoring (RMON).

Chapter 51

Performing Diagnostics

Describes vaious types of diagnostics on the Catalyst 4500 series switch.

Chapter 52

Configuring WCCP Version 2 Services

Describes how to configure the Catalyst 4500 series switches to redirect traffic to cache engines (web caches) using the Web Cache Communication Protocol (WCCP), and describes how to manage cache engine clusters (cache farms).

Chapter 53

Configuring MIB Support

Describes how to configure configure SNMP and MIB support.

Chapter 54

ROM Monitor

Describes the ROM Monitor.

Appendix A

Acronyms and Abbreviations

Defines acronyms and abbreviations used in this book


Related Documentation

Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900, Catalyst ME 4900, and Catalyst 4900M) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide. Refer to the following home pages for additional information:

Catalyst 4500 Series Switch Documentation Home

http://www.cisco.com/go/cat4500/docs

Catalyst 4900 Series Switch Documentation Home

http://www.cisco.com/go/cat4900/docs

Cisco ME 4900 Series Ethernet Switches Documentation Home

http://www.cisco.com/en/US/products/ps7009/tsd_products_support_series_home.html

Hardware Documents

Installation guides and notes including specifications and relevant safety information are available at the following URLs:

Catalyst 4500 Series Switches Installation Guide

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html

Catalyst 4500 E-series Switches Installation Guide

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html

For information about individual switching modules and supervisors, refer to the Catalyst 4500 Series Module Installation Guide at:

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/module/guide/mod_inst.html

Regulatory Compliance and Safety Information for the Catalyst 4500 Series Switches

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html

Installation notes for specific supervisor engines or for accessory hardware are available at:

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html

Catalyst 4900 and 4900M hardware installation information is available at:

http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html

Cisco ME 4900 Series Ethernet Switches installation information is available at:

http://www.cisco.com/en/US/products/ps7009/prod_installation_guides_list.html

Software Documentation

Software release notes, configuration guides, command references, and system message guides are available at the following URLs:

Catalyst 4500 release notes are available at:

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html

Catalyst 4900 release notes are available at:

http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html

Cisco ME4900 4900 Series Ethernet Switch release notes are available at:

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_11511.html

Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900, and
Cisco ME 4900 Series Ethernet Switches are available at the following URLs:

Catalyst 4500 Series Software Configuration Guide

http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html

Catalyst 4500 Series Software Command Reference

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html

Catalyst 4500 Series Software System Message Guide

http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html

Cisco IOS Documentation

Platform-independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:

Cisco IOS configuration guides, Release 12.x

http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html

Cisco IOS command references, Release 12.x

http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html

You can also use the Command Lookup Tool at:

http://tools.cisco.com/Support/CLILookup/cltSearchAction.do

Cisco IOS system messages, version 12.x

http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html

You can also use the Error Message Decoder tool at:

http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi

For information about MIBs, refer to:

http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml

Conventions

This document uses the following typographical conventions:

Convention
Description

boldface font

Commands, command options, and keywords are in boldface.

italic font

Command arguments for which you supply values are in italics.

[   ]

Command elements in square brackets are optional.

{ x | y | z }

Alternative keywords in command lines are grouped in braces and separated by vertical bars.

[ x | y | z ]

Optional alternative keywords are grouped in brackets and separated by vertical bars.

string

A nonquoted set of characters. Do not use quotation marks around the string because the string will include the quotation marks.

screen font

System displays are in screen font.

boldface screen font

Information you must enter verbatim is in boldface screen font.

italic screen font

Arguments for which you supply values are in italic screen font.

 

This pointer highlights an important line of text in an example.

^

Represents the key labeled Control—for example, the key combination ^D in a screen display means hold down the Control key while you press the D key.

<   >

Nonprinting characters such as passwords are in angle brackets.


Notes use the following conventions:


Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.


Cautions use the following conventions:


Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Commands in Task Tables

Commands listed in task tables show only the relevant information for completing the task and not all available options for the command. For a complete description of a command, refer to the command in the Catalyst 4500 Series Switch Cisco IOS Command Reference.

Notices

The following notices pertain to this software license.

OpenSSL/Open SSL Project

This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).

This product includes software written by Tim Hudson (tjh@cryptsoft.com).

License Issues

The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.

OpenSSL License:

Copyright © 1998-2007 The OpenSSL Project. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)".

4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.

5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.

6. Redistributions of any form whatsoever must retain the following acknowledgment:

"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)".

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS"' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).

Original SSLeay License:

Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.

This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).

The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgement:

"This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)".

The word `cryptographic' can be left out if the routines from the library being used are not cryptography-related.

4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)".

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].

Obtaining Documentation, Obtaining Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html