Index

Security Exchange Protocol

See SXP

Numerics

10/100 autonegotiation feature, forced 25

10-Gigabit Ethernet or Gigabit Ethernet ports

deploy on WS-X4606-10GE-E and Sup 6-E 13

10-Gigabit Ethernet port

deploy with Gigabit Ethernet SFP ports 12, 13

10-slot chassis, support for WS-X46490-CSFP-E 17

1400 W DC Power supply

special considerations 21

1400 W DC SP Triple Input power supply

special considerations 22

802.10 SAID (default) 4

802.1AE

standard 2

802.1Q

trunks 6

tunnel ports with other features 5

tunneling

compatibility with other features 5

defaults 3

described 2

802.1Q VLANs

trunk restrictions 4

802.1s

See MST

802.1w

See MST

802.1X

See port-based authentication

802.1X authentication

Authentication Failed VLAN assignment 17

for Critical Authentication 14

for guest VLANs 11

for MAC Authentication Bypass 12

for Unidirectional Controlled Port 15

VLAN User Distribution 16

web-based authentication 14

with port security 19

with VLAN assignment 10

with voice VLAN ports 22

802.1X Host Mode 6

multiauthentication mode 8

multidomain authentication mode 7

single-host 7

802.1x-REV 2

802.3ad

See LACP

9000W AC, displaying OBFL 4

A

AAA 1

AAA (authentication, authorization, and accounting). See also port-based authentication. 1

abbreviating commands 5

about Wireshark 5

access control entries

See ACEs

access control entries and lists 1

access list filtering, SPAN enhancement 13

access lists

using with WCCP 8

access ports

and Layer 2 protocol tunneling 15

configure port security 7, 22

configuring 7

access VLANs 5

access-group mode, configuring on Layer 2 interface 33

access-group mode, using PACL with 32

accounting

with RADIUS 113

with TACACS+ 16, 21

ACEs

ACLs 2

IP 41, 2

Layer 4 operation restrictions 11

ACEs and ACLs 1

ACL assignments and redirect URLs, configure 40

ACL assignments, port-based authentication 20

ACL configuration, displaying a Layer 2 interface 34

ACLs

ACEs 2

and SPAN 5

and TCAM programming for Sup 6-E 10

and TCAM programming for Sup II-Plus thru V-10GE 7

applying IPv6 ACLs to a Layer 3 interface 18

applying on routed packets 28

applying on switched packets 27

compatibility on the same switch 3

configuring with VLAN maps 27

CPU impact 13

downloadable 7

hardware and software support 6

IP, matching criteria for port ACLs 5

MAC extended 14

matching criteria for router ACLs 4

port

and voice VLAN 5

defined 3

processing 13

selecting mode of capturing control packets 7

troubleshooting high CPU 7

types supported 3

understanding 2

VLAN maps 5

ACLs and VLAN maps, examples 21

ACLs, applying to a Layer 2 interface 33

acronyms, list of 1

action drivers, marking 21, 55

activating and deactivating a capture point, Wireshark 14

activating and deactivating Wiresharkcapture points, conceptual, Wireshark 10

active queue management 9

active queue management via DBL, QoS on Sup 6-E 34, 68

active traffic monitoring, IP SLAs 1

adding members to a community 9

address resolution 44

addresses

displaying the MAC table 44

dynamic

changing the aging time 30

defined 28

learning 29

removing 31

IPv6 2

MAC, discovering 44

See MAC addresses

static

adding and removing 36

defined 28

adjacency tables

description 2

displaying statistics 10

administrative VLAN

REP, configuring 9

administrative VLAN per segment 9

administrative VLAN, REP 8

advertisements

LLDP 7, 2

advertisements, VTP

See VTP advertisements

aggregation switch, enabling DHCP snooping 9

aging time

MAC address table 30

All Auth manager sessions on the switch authorized for a specified authentication method 128

All Auth manager sessions, displaying summary 128

ANCP client

enabling and configuring 2

guidelines and restrictions 5

identify a port with DHCP option 82 4

identify a port with protocol 2

overview 1

ANCP protocol

identifying a port with 2

applying IPv6 ACLs to a Layer 3 interface 18

AQM via DBL, QoS on Sup 6-E 34, 68

archiving crashfiles information 8

ARP

defined 44

table

address resolution 44

managing 44

asymmetrical links, and 802.1Q tunneling 3

attachment points, Wireshark 6

attributes, RADIUS

vendor-proprietary 116

vendor-specific 114

Auth manager session for an interface, verifying 128

Auth manager summary, displaying 128

authentication

NTP associations 4

RADIUS

key 106

login 108

See also port-based authentication

TACACS+

defined 16

key 18

login 19

Authentication Failed, configuring 80.1X 73

Authentication methods registered with the Auth manager, determining 127

authentication open comand 8

authentication proxy web pages 4

authentication server

defined 3

RADIUS server 3

Authentication, Authorization, and Accounting (AAA) 1

authoritative time source, described 2

authorization

with RADIUS 112

with TACACS+ 16, 21

authorized and unauthorized ports 5

authorized ports with 802.1X 5

Auto Identity

Built-in Policies 4

Class Map Templates 4

Global Template 2

Interface Templates 3

Overview 2

Parameter Maps 5

Service Templates 5

Auto SmartPorts built-in macros

configuring parameters 6

Auto SmartPorts macros

built-in macros 4

configuration guidelines 5

default configuration 4

defined 1

displaying 13

enabling 3

IOS shell 2, 10

Auto Smartports macros

defined 2

Auto SmartPorts user-defined macros

configuring 10

autoconfiguration 2

automatic discovery

considerations 7

Auto-MDIX on a port

configuring 37

displaying the configuration 37

overview 36

autonegotiation feature

forced 10/100Mbps 25

auto-sync command 8, 7

Auto SmartPorts macros

See also SmartPorts macros

Auto Smartports macros

See also Smartports macros

B

b command 3

b flash command 3

Baby Giants

interacting with 35

BackboneFast

adding a switch (figure) 3

and MST 23

configuring 23

link failure (figure) 22, 23

not supported MST 23

understanding 21

See also STP

banners

configuring

login 27

message-of-the-day login 24

default configuration 24

when displayed 24

BFD

and hardware support 7

configuration example

BFD in a BGP network 25

BFD in an EIGRP network with echo mode enabled by default 17

BFD in an OSPF network 22

support for static routing 27

configuring

Echo mode 15

session parameters on the interface 8

Slow timer 16

support for BGP 9

support for dynamic routing protocols 9

support for EIGRP 10

support for OSPF 11

support for static routing 13

disabling echo mode without asymmetry 16

monitoring and troubleshooting 17

neighbor relationships 3

operation 3

prerequisites 2

restrictions 2

BGP 17

routing session with multi-VRF CE 9

blocking packets 1

blocking state (STP)

RSTP comparisons (table) 24

Boolean expressions in tracked lists 4

boot bootldr command 32

boot command 28

boot commands 3

boot fields

See configuration register boot fields

boot system command 26, 32

boot system flash command 28

bootstrap program

See ROM monitor

Border Gateway Protocol

See BGP

boundary ports

description 27

BPDU Guard

and MST 23

configuring 23

overview 15

BPDUs

and media speed 2

pseudobridges and 25

what they contain 3

Bridge Assurance 8, 11

bridge ID

See STP bridge ID

bridge priority (STP) 17

bridge protocol data units

See BPDUs

bridging loop 40

Broadcast Storm Control

disabling 5

enabling 3

Built-in macros and user-defined triggers, configuring mapping 9

C

cache engine clusters 1

cache engines 1

cache farms

See cache engine clusters

Call Home

description 24, 1

message format options 2

messages

format options 2

call home 1

alert groups 6

configuring e-mail options 9

contact information 4

default settings 18

destination profiles 5

displaying information 13

mail-server priority 10

pattern matching 8

periodic notification 8

rate limit messages 9

severity threshold 8

smart call home feature 2

SMTP server 9

testing communications 10

call home alert groups

configuring 6

description 6

subscribing 7

call home contacts

assigning information 4

call home destination profiles

attributes 5

configuring 5

description 5

displaying 16

call home notifications

full-txt format for syslog 25

XML format for syslog 28

candidate switch, cluster

defined 12

candidates

automatic discovery 7

capture filter, Wireshark 7

capture points, Wireshark 6

Capturing control packets

selecting mode 7

cautions

Unicast RPF

BGP optional attributes 4

cautions for passwords

encrypting 22

CDP

automatic discovery in communities 7

configuration 2

defined with LLDP 1

displaying configuration 3

enabling on interfaces 3

host presence detection 8

Layer 2 protocol tunneling 13

maintaining 3

monitoring 3

overview 2, 1

cdp enable command 3

CEF

adjacency tables 2

and NSF with SSO 5

configuring load balancing 7

displaying statistics 8

enabling 7, 2

hardware switching 4

load balancing 6

overview 1

software switching 4

certificate authority (CA) 3

CFM

and Ethernet OAM interaction 51

and Ethernet OAM, configuring 51

clearing 31

configuration guidelines 7, 4

configuring crosscheck for VLANs 11

configuring fault alarms 16

configuring port MEP 14

configuring static remote MEP 13, 16, 18

crosscheck 5

defined 2

EtherChannel support 7, 4

fault alarms

configuring 16

IP SLAs support for 6

IP SLAs with endpoint discovers 21

maintenance domain 3

manually configuring IP SLAs ping or jitter 19

measuring network performance 6

monitoring 32, 33

port MEP, configuring 14

remote MEPs 5

static RMEP check 5

static RMEP, configuring 13, 16, 18

Y.1731

described 27

CGMP

overview 2

Change of Authorization, RADIUS 100

channel-group group command 49, 9, 11

Cisco 7600 series Internet router

enabling SNMP 4, 5

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco IOS IP SLAs 2

Cisco IOS NSF-aware

support 2

Cisco IOS NSF-capable support 2

Cisco IP Phones

configuring 2

sound quality 1

Cisco TrustSec

credentials 10

switch-to-switch security

802.1x mode 11

configuration example 14

manual mode 12

Cisco TrustSec Network Device Admission Control

See NDAC

CiscoWorks 2000 4

CIST

description 22

civic location 3

class level, configure in a service policy 31, 65

class of service

See CoS

clear cdp counters command 4

clear cdp table command 3

clear counters command 42

clear ip eigrp neighbors command 19

clearing

Ethernet CFM 31

IP multicast table entries 28

CLI

accessing 2

backing out one level 5

getting commands 5

history substitution 4

managing clusters 13

modes 5

monitoring environments 1

ROM monitor 7

software basics 4

client processes, tracking 1

clients

in 802.1X authentication 3

clock

See system clock

clustering switches

command switch characteristics

and VTY 12

convert to a community 10

managing

through CLI 13

overview 2

planning considerations

CLI 13

passwords 8

CoA Request Commands 102

command modes 5

command switch, cluster

requirements 11

command-line processing 3

commands

b 3

b flash 3

boot 3

confreg 3

dev 3

dir device 3

frame 5

i 3

listing 5

meminfo 6

reset 3

ROM monitor 2–3

ROM monitor debugging 5–6

SNMP 4

sysret 5

common and internal spanning tree

See CIST

common spanning tree

See CST

community of switches

access modes in Network Assistant 9

adding devices 9

communication protocols 8

community name 8

configuration information 9

converting from a cluster 10

host name 8

passwords 8

community ports 3

community strings

configuring 7

overview 4

community VLANs 2, 3

configure as a PVLAN 15

compiling MIBs 4

config terminal command 9

config-register command 29

configurable leave timer,IGMP 4

configuration examples

SNMP 15

configuration files

limiting TFTP server access 15

obtaining with DHCP 6

saving 10

system contact and location information 14

configuration guidelines

CFM 7, 4

Ethernet OAM 35

REP 7

SNMP 6

VLAN mapping 9

configuration register

boot fields

listing value 29

modifying 28

changing from ROM monitor 3

changing settings 28–29

configuring 26

settings at startup 27

configure class-level queue-limit in a service policy 31, 65

configure terminal command 29, 2

configuring access-group mode on Layer 2 interface 33

configuring flow control 29

configuring interface link and trunk status envents 43

configuring named IPv6 ACLs 16

configuring named MAC extended ACLs 14, 15

configuring unicast MAC address filtering 14

configuring VLAN maps 19

confreg command 3

Connectivity Fault Management

See CFM

console configuration mode 5

console download 4–5

console port

disconnecting user sessions 7

monitoring user sessions 6

contact information

assigning for call home 4

Control Plane Policing

and Layer 2 Control packet QoS, configuration example 18

configuration guidelines and restrictions 9

configuring for control plane traffic 4

configuring for data plane and management plan traffic 6

defaults 4

general guidelines 4

monitoring 10

understanding 2

control protocol, IP SLAs 4

controlling switch access with RADIUS 98

convergence

REP 4

copy running-config startup-config command 10

copy system:running-config nvram:startup-config command 32

core system filter, Wireshark 7

CoS

definition 3

figure 2

overriding on Cisco IP Phones 4

priority 4

counters

clearing MFIB 29

clearing on interfaces 42

CPU port sniffing 10

CPU, impact of ACL processing 13

crashfiles information, archiving 8

Critical Authentication

configure with 802.1X 65

crosscheck, CFM 5, 11

CST

description 25

IST and 22

MST and 22

CTS Fields 6

customer edge devices 2

C-VLAN 2, 7

D

database agent

configuration examples 15

enabling the DHCP Snooping 13

daylight saving time 13

debug commands, ROM monitor 5–6

decoding and displaying packets, Wireshark 9

default configuration

802.1X 29

banners 24

DNS 23

Ethernet OAM 35

IGMP filtering 30

IGMP snooping 5, 6

IP SLAs 6

IPv6 7

Layer 2 protocol tunneling 16

LLDP 5

MAC address table 30

MVR 23

NTP 4

private VLANs 12

RADIUS 105

REP 7

resetting the interface 45

RMON 3

SNMP 5

SPAN and RSPAN 6

system message logging 3

TACACS+ 18

VLAN mapping 9

Y.1731 29

default gateway

configuring 11

verifying configuration 11

default settings, erase commad 33

default web-based authentication configuration

802.1X 6

defining/modifying/deleting a capture point, Wireshark 12

denial-of-service attacks

IP address spoofing, mitigating 5

Unicast RPF, deploying 5

denying access to a server on another VLAN 25

deploying 10-Gigabit Ethernet and a Gigabit Ethernet SFP ports 12, 13

deploying 10-Gigabit Ethernet and a Gigabit Ethernet SFP ports on WS-X4606-10GE-E and Sup 6-E 13

description command 29

dev command 3

device discovery protocol 1

device IDs

call home format 21, 22

device sensor

configuring 120

DHCP

configuring

rate limit for incoming packets 13

denial-of-service attacks, preventing 13

rate limiting of packets

configuring 13

DHCP option 82

identifying a port with 4

overview 3

DHCP Snooping

enabling, and Option 82 10

DHCP snooping

accepting untrusted packets form edge switch 10

configuring 6

default configuration 7

displaying binding tables 19

displaying configuration 19

displaying information 18

enabling 7

enabling on private VLAN 12

enabling on the aggregation switch 9

enabling the database agent 13

message exchange process 4

monitoring 23

option 82 data insertion 3

overview 1

Snooping database agent 2

DHCP Snooping Database Agent

adding to the database (example) 18

enabling (example) 15

overview 2

reading from a TFTP file (example) 17

DHCP-based autoconfiguration

client request message exchange 3

configuring

client side 3

DNS 5

relay device 5

server-side 4

TFTP server 4

example 7

lease options

for IP address information 4

for receiving the configuration file 4

overview 2

relationship to BOOTP 3

Diagnostics

online 1

Power-On-Self-Test

causes of failure 19

how it works 10

overview 10

Power-On-Self-Test for Supervisor Engine V-10GE 12

Differentiated Services Code Point values

See DSCP values

DiffServ architecture, QoS 2

Digital optical monitoring transceiver support 23

dir device command 3

disabled state

RSTP comparisons (table) 24

disabling

broadcast storm control 5

disabling multicast storm control 6

disconnect command 7

discovery, clusters

See automatic discovery

discovery, Ethernet OAM 34

display dection and removal events 7

display filter, Wireshark 7

display PoE consumed by a module 8

display PoE detection and removal events 7

displaying

Auth Manager sumary for an interface 128

MAB details 130

summary of all Auth manager sessions 128

summary of all Auth manager sessions on the switch authorized for a specified authentication method 128

displaying EtherChannel to a Virtual Switch System 20

displaying storm control 6

displaying Wireshark information 14

dispute mechanism 40

DNS

and DHCP-based autoconfiguration 5

default configuration 23

displaying the configuration 24

overview 22

setting up 23

Domain Name System

See DNS

domain names

DNS 22

double-tagged packets

802.1Q tunneling 2

Layer 2 protocol tunneling 15

downloading MIBs 3, 4

drop threshold for Layer 2 protocol packets 16

DSCP values

definition 4

IP precedence 2

Dual_Active Detection

using Enhanced PAgP 23

Dual-Active Detection, using Fast-Hello 24

duplex command 27

duplex mode

configuring interface 24

dynamic ARP inspection

ARP cache poisoning 2

configuring

ACLs for non-DHCP environments 11

in DHCP environments 5

log buffer 14

rate limit for incoming ARP packets 16

denial-of-service attacks, preventing 16

interface trust state, security coverage 3

log buffer

configuring 14

logging of dropped packets 4

overview 1

port channels, their behavior 5

priority of static bindings 4

purpose of 2

rate limiting of ARP packets 4

configuring 16

validation checks, performing 19

Dynamic Host Configuration Protocol snooping

See DHCP snooping

dynamic port VLAN membership

example 28

limit on hosts 28

reconfirming 25, 26

troubleshooting 28

E

EAP frames

changing retransmission time 88

exchanging (figure) 4, 6, 13

request/identity 4

response/identity 4

setting retransmission number 89

EAPOL frames

802.1X authentication and 3

OTP authentication, example (figure) 4, 13

start 4

Echo mode,configuring BFD 15

edge ports

description 27

EGP

overview 17

EIGRP

configuration examples 20

monitoring and maintaining 19

EIGRP (Enhanced IGRP)

stub routing

benefits 18

configuration tasks 18

configuring 14

overview 14

restrictions 18

verifying 19

EIGRP (enhanced IGRP)

overview 18

eigrp stub command 19

EIGRP stub routing, configuring 13

ELIN location 3

e-mail addresses

assigning for call home 4

e-mail notifications

Call Home 24, 1

Embedded CiscoView

displaying information 48

installing and configuring 45

overview 45

emergency alarms on Sup Engine 6-E systems 5

enable command 9, 28

enable mode 5

enabling SNMP 4, 5

encryption keying 2

encryption keys, MKA 2

Enhanced Interior Gateway Routing Protocol

See EIGRP

enhanced object tracking

defined 1

IP routing state 2

line-protocol state 2

tracked lists 3

Enhanced PoE support on E-series 15

Enhanced PoE support on E-series,configuring Universal PoE 16

environmental monitoring

using CLI commands 1

EPM logging 131

errdisable recovery

configuring 14

ERSPAN

Overview 3

EtherChannel

channel-group group command 49, 9, 11

configuration guidelines 32, 6

configuring 7–20

configuring (tasks) 30

configuring Layer 2 11

configuring Layer 3 8

DFC restriction, see CSCdt27074 in the Release Notes

displaying to a virtual switch system 20

interface port-channel command 8

lacp system-priority

command example 16

modes 3

overview 2

PAgP

Understanding 4

physical interface configuration 49, 8

port-channel interfaces 2

port-channel load-balance command 19

removing 20

removing interfaces 19

understanding 1

EtherChannel guard

disabling 7

enabling 6

overview 6

Ethernet management port

and routing 6

and routing protocols 6

configuring 11

default setting 6

described 29, 6

for network management 29, 6

specifying 11

supported features 10

unsupported features 11

Ethernet management port, internal

and routing protocols 6

Ethernet Management Port, using 6

Ethernet OAM 34

and CFM interaction 51

configuration guidelines 35

configuring with CFM 51

default configuration 35

discovery 34

enabling 36, 52

link monitoring 34, 38

messages 34

protocol

defined 33

monitoring 49

remote failure indications 34

remote loopback 34, 37

templates 45

Ethernet OAM protocol CFM notifications 51

Ethernet Remote Defect Indication (ETH-RDI) 28

event triggers, user-defined

configuring, 802.1X-based 8

configuring, MAC address-based 9

explicit host tracking

enabling 11

extended range VLANs

See VLANs

Extensible Authentication Protocol over LAN 2

Exterior Gateway Protocol

See EGP

F

Fa0 port

See Ethernet management port

Failure detection, using BFD 7

Fallback Authentication

 

configure with 802.1X 80

fast link notification

on VSL failure 13

Fast UDLD

configuring probe message interval 8

default configuration 3

displaying link status 9

enabling globally 5

enabling on individual interface 7

enabling per-interface 6

modes of operation 3

resetting disabled LAN interfaces 8

use case 2

Fast UDLD, overview 1

FastDrop

overview 11

fastethernet0 port

See Ethernet management port

Fast-Hello

dual-active detection 24

Fast-Hello dual-active detection, configuring 53

feature interactions, Wireshark 10

FIB

description 2

See also MFIB

fiber-optics interfaces

disabling UDLD 7

Filter-ID ACL and Per-User ACL, configureport-based authentication

configure Per-User ACL and Filter-ID ACL 48

filtering

in a VLAN 19

non-IP traffic 14, 15

filters, Wireshark 6

flags 12

Flash memory

configuring router to boot from 31

loading system images from 30

security precautions 31

Flex Links

configuration guidelines 5

configuring 6

configuring preferred VLAN 9

configuring VLAN load balancing 8

monitoring 12

Flexible NetFlow

caveats 8

defined 4, 1

flooded traffic, blocking 2

flow control, configuring 29

flowchart, traffic marking procedure 21, 55

For 13

forward-delay time (STP)

configuring 19

forwarding information base

See FIB

frame command 5

G

gateway

See default gateway

get-bulk-request operation 3

get-next-request operation 3, 4

get-request operation 3, 4

get-response operation 3

Gigabit Ethernet SFP ports

deploy with 10-Gigabit Ethernet 12, 13

GLBP, introduction 15

global configuration mode 5

Guest-VLANs

configure with 802.1X 60

H

hardware and software ACL support 6

hardware switching 5

hello time (STP)

configuring 17

high CPU due to ACLs, troubleshooting 7

history

CLI 4

history table, level and number of syslog messages 9

hop counts

configuring MST bridges 28

host

limit on dynamic port 28

host modes, MACsec 3

host ports

kinds of 4

host presence CDP message 8

Hot Standby Routing Protocol

See HSRP

HSRP

description 15

HSRP, introduction 15

hw-module module num power command 22

I

i command 3

ICMP

enabling 12

ping 7

running IP traceroute 9

time exceeded messages 9

ICMP Echo operation

configuring 11

IP SLAs 11

IDS

using with SPAN and RSPAN 2

IEEE 802.1ag 2

IEEE 802.1s

See MST

IEEE 802.1w

See MST

IEEE 802.3ad

See LACP

IGMP

configurable-leave timer 4

description 3

enabling 15

explicit host tracking 4

immediate-leave processing 3

leave processing, enabling 8

overview 2

report suppression

disabling 10

IGMP filtering

configuring 31

default configuration 30

described 30

monitoring 34

IGMP groups

setting the maximum number 33

IGMP Immediate Leave

configuration guidelines 9

IGMP profile

applying 32

configuration mode 31

configuring 31

IGMP Snooping

configure

leave timer 9

configuring

Learning Methods 7

static connection to a multicast router 8

configuring host statically 11

enabling

Immediate-Leave processing

explicit host tracking 11

suppressing multicast flooding 12

IGMP snooping

configuration guidelines 5

default configuration 5, 6

enabling

globally 6

on a VLAN 6

enabling and disabling 6

IP multicast and 4

monitoring 14, 10

overview 2

IGMP Snooping, displaying

group 16

hot membership 15

how to 15

MAC address entries 18

multicast router interfaces 17

on a VLAN interface 18

Querier information 19

IGMPSnooping Querier, configuring 10

Immediate Leave, IGMP

enabling 8

immediate-leave processing

enabling 8

IGMP

See fast-leave processing

ingress packets, SPAN enhancement 12

inline power

configuring on Cisco IP phones 5

insufficient inline power handling for Supervisor Engine II-TS 22

Intelligent Power Management 4

interacting with Baby Giants 35

interface

displaying operational status 6

interface command 9, 2

interface configuration

REP 10

interface link and trunk status events

configuring 43

interface port-channel command 48, 8

interface range command 4

interface range macro command 11

interfaces

adding descriptive name 29

clearing counters 42

configuring 2

configuring ranges 4

displaying information about 41

Layer 2 modes 3

maintaining 41

monitoring 41

naming 29

numbers 2

overview 2

restarting 42, 43

See also Layer 2 interfaces

using the Ethernet Management Port 6

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Internet Protocol version 6

See IPv6

introduction

802.1X Identity-Based Network Security, list of supported features 34

Bidirectional Forwarding Detection 13

Cisco Call Home 24

Cisco Energy Wise 24

Cisco Express Forwarding 14

Cisco IOS IP Service Level Agreements 24

Cisco IOS Mediatrace and Performance Monitor 26

Cisco Media Services Proxy 25

Cisco Medianet AutoQoS 25

Cisco Medianet Flow Metadata 26

Cisco TrustSec MACsec Encryption 36

Cisco TrustSec Security Architecture 36

Debugging Features (platform and debug platform) 43

Device Sensor 14

Dynamic Host Control Protocol 28

Easy Virtual Network 28

EIGRP Stub routing 14

Embedded Event Manager 29

Enhanced Object Tracking 14

EtherChannel bundles 3

Ethernet CFM 3

Ethernet Management Port 29

Ethernet OAM Protocol 3

FAT File Management System (Sup 60-E, 6L-E, 4948E, and 4900M) 30

File System Management (Sup 7-E and 7L-E) 29

Flex Link and MAC Address-Table Move Update 3

Flexible Netflow (Sup 7-E and 7L-E) 4

GLBP 15

hard-based Control Plane Policing 37

HSRP 15

In Service Software Upgrade 19

Intelligent Power Management 30

Internet Group Management Protocol (IGMP) Snooping 4

IP Routing protocols 17

IP Source Guard 38

IP Source Guard or Static Hosts 38

IPv6 19

IPv6 First Hop Security 38

IPv6 Multicast BSR and BSR Scoped Zone Support, introduction 5

IPv6 Multicast Listen Discovery (MLD) and Multicast Listen Discovery Snooping 6

IS-IS 18

Jumbo Frame 6

Layer 2 traceroute 43

Link Aggregation Control Protocol 7

MAC Address Notification 30

NAC

Layer 2 802.1X authentication 40

Layer 2 IP validation 40

NetFlow-lite 31

Network Security with ACLs (IP ACLs, MAC ACLs, Port ACLs, Router, ACLs, and VLAN ACLs) 41

NSF with SSO 21

OSPF 18

OSPF for Routed Access 21

Port Security 41

Power over Ethernet 31

RIP 19

Simple Network Management Protocol 31

SPAN and RSPAN 32

Time Domain Reflectometry 43

Unicast Reverse Path Forwarding 22

Universal Power over Ethernet 32

Virtual Router Redundancy Protocol 23

VRF-lite 22

Web Content Coordination Protocol 32

Web-based Authentication 43

Wireshark 33

XML-PI 33

Intrusion Detection System

See IDS

inventory management TLV 3, 9

IOS shell

See Auto SmartPorts macros

IP

configuring default gateway 11

configuring static routes 11

displaying statistics 8

IP addresses

128-bit 2

cluster candidate or member 12

cluster command switch 11

discovering 44

IPv6 2

ip cef command 7, 2

IP Enhanced IGRP

interfaces, displaying 20

ip icmp rate-limit unreachable command 12

ip igmp profile command 31

ip igmp snooping tcn flood command 13

ip igmp snooping tcn flood query count command 14

ip igmp snooping tcn query solicit command 14

IP information

assigned

through DHCP-based autoconfiguration 2

ip load-sharing per-destination command 8

ip local policy route-map command 12

ip mask-reply command 13

IP MTU sizes,configuring 9

IP multicast

clearing table entries 28

configuring 13

default configuration 14

displaying PIM information 24

displaying the routing table information 24

enabling dense-mode PIM 15

enabling sparse-mode 15

features not supported 13

hardware forwarding 9

IGMP snooping and 5, 4

overview 1

routing protocols 2

software forwarding 9

See also Auto-RP; IGMP; PIM; RP; RPF

IP multicast routing

enabling 14

monitoring and maintaining 23

IP multicast traffic, load splitting 22

ip multicast-routing command 14

IP phones

configuring voice ports 3

See Cisco IP Phones 1

ip pim command 15

ip pim dense-mode command 15

ip pim sparse-dense-mode command 16, 17

ip policy route-map command 9, 11, 14

IP Port Security for Static Hosts

on a Layer 2 access port 25

on a PVLAN host port 28

overview 24

ip redirects command 13

IP routing tables

deleting entries 28

IP Service Level Agreements

See IP SLAs

IP service levels, analyzing 1

IP SLAs

benefits 2

CFM endpoint discovery 21

configuration guidelines 6

Control Protocol 4

default configuration 6

definition 1

ICMP echo operation 11

manually configuring CFM ping or jitter 19

measuring network performance 3

multioperations scheduling 5

operation 3

reachability tracking 9

responder

described 4

enabling 7

response time 4

scheduling 5

SNMP support 2

supported metrics 2

threshold monitoring 6

track state 9

UDP jitter operation 8

IP Source Guard

configuring 20

configuring on private VLANs 22

displaying 22, 23

overview 23

IP statistics

displaying 8

IP traceroute

executing 9

overview 8

IP unicast

displaying statistics 8

IP Unnumbered support

configuring on a range of Ethernet VLANs 5

configuring on LAN and VLAN interfaces 4

configuring with connected host polling 6

DHCP Option 82 2

displaying settings 7

format of agent remote ID suboptions 2

troubleshooting 8

with conected host polling 3

with DHCP server and Relay agent 2

ip unreachables command 12

IPsec VPN, introduction 40

IPv4, IPv6, and MAC ACLs, configuring on a Layer 2 interface 31

IPv6

addresses 2

default configuration 7

defined 19, 1

Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 6

Router ID 6

OSPF 6

IPv6 control traffic, policing 20

IPv6 First Hop Security, introduction 38

IPX

redistribution of route information with EIGRP 18

is 23

IS-IS, introduction 18

ISL

trunking with 802.1Q tunneling 4

isolated port 4

isolated VLANs 2, 3, 4

ISSU

compatibility matrix 63, 14

compatiblity verification using Cisco Feature Navigator 64, 15

NSF overview 3, 4

perform the process

aborting a software upgrade 79, 34

configuring the rollback timer as a safeguard 81, 35, 36

displaying a compatibility matrix 82, 36, 40, 37

loading the new software on the new standby 72, 27

stopping the rollback timer 72, 26

switching to the standby 70, 24

verify the ISSU state 67, 20, 21

verify the redundancy mode 65, 19

verify the software installation 65, 18, 19

vload the new software on standby 68, 21

prerequisites 58, 1, 2

process overview 6, 7

restrictions 58, 1, 2

SNMP support 15

SSO overview 3, 4

versioning capability in software to support 13

IST

and MST regions 22

description 22

master 27

ITU-T Y.1731

See Y.1731

J

jumbo frames

and ethernet ports 33

configuring MTU sizes for 34

ports and linecards that support 31

understanding MTUs 32

understanding support 32

VLAN interfaces 33

K

keyboard shortcuts 3

L

l2protocol-tunnel command 17, 19

labels, definition 3

LACP

system ID 5

Layer 2 access ports 7

Layer 2 Control Packet QoS

and CoPP configuration example 18

default configuation 15

disabling 17

enabvling 15

guideline and restrictions 20

understanding 15

Layer 2 frames

classification with CoS 2

Layer 2 interface

applying ACLs 33

configuring access-mode mode on 33

configuring IPv4, IPv6, and MAC ACLs 31

displaying an ACL configuration 34

Layer 2 interface type

resetting 24

setting 24

Layer 2 interfaces

assigning VLANs 7

configuring 5

configuring as PVLAN host ports 18

configuring as PVLAN promiscuous ports 17

configuring as PVLAN trunk ports 19

defaults 4

disabling configuration 8

modes 3

show interfaces command 6

Layer 2 protocol tunneling

default configuration 16

guidelines 16

Layer 2 switching

overview 1

Layer 2 Traceroute

and ARP 10

and CDP 10

host-to-host paths 10

IP addresses and subnets 10

MAC addresses and VLANs 10

multicast traffic 10

multiple devices on a port 10

unicast traffic 43, 9

usage guidelines 10

Layer 2 trunks

configuring 5

overview 3

Layer 3 interface counters,configuring 11

Layer 3 interface counters,understanding 3

Layer 3 interface, applying IPv6 ACLs 18

Layer 3 interfaces

changing from Layer 2 mode 16

configuration guidelines 5

configuring VLANs as interfaces 8

overview 1

counters 3

logical 2

physical 2

SVI autostate exclude 3

Layer 3 packets

classification methods 2

Layer 4 port operations

configuration guidelines 11

restrictions 11

Leave timer, enabling 9

licenses, managing with PRTU 14

limitations on using a TwinGig Convertor 14

Link Aggregation Control Protocol, introduction 7

link and trunk status events

configuring interface 43

link integrity, verifying with REP 4

Link Layer Discovery Protocol

See CDP

link monitoring, Ethernet OAM 34, 38

link status, displaying UDLD 9

link-state tracking

configuration guidelines 26

default configuration 26

described 23

displaying status 27

generic configuration procedure 26

listening state (STP)

RSTP comparisons (table) 24

LLDP

configuring 4

characteristics 5

default configuration 5

disabling and enabling

globally 6

on an interface 7

monitoring and maintaining 14

overview 1

transmission timer and holdtime, setting 5

LLDP Media Endpoint Discovery

See LLDP-MED

LLDP-MED

configuring

procedures 4

TLVs 9, 11

monitoring and maintaining 14

overview 1

supported TLVs 2

load balancing

configuring for CEF 7

configuring for EtherChannel 18

overview 6

per-destination 7

load splitting IP multicast traffic 22

Location Service

overview 1

location service

configuring 12

understanding 3

location TLV 3, 9

logging, EPM 131

Logical Layer 3 interfaces

configuring 6

logical layer 3 VLAN interfaces 2

login authentication

with RADIUS 108

with TACACS+ 19

login banners 24

login timer

changing 6

logoutwarning command 6

loop guard

and MST 23

configuring 5

overview 3

M

MAC address learning, disabling on a VLAN 39

confuguring 39

deployment scenarios 40

feature compatibility 42

feature incompatibility 43

feature inompatibility 43

usage guidelines 40

MAC address table

displaying 44

MAC addresses

aging time 30

allocating 6

and VLAN association 29

building tables 28, 2

convert dynamic to sticky secure 5

default configuration 30

disabling learning on a VLAN 39

discovering 44

displaying 3

displaying in DHCP snooping binding table 19

dynamic

learning 29

removing 31

in ACLs 14

static

adding 37

allowing 38

characteristics of 36

dropping 38

removing 37

sticky 4

sticky secure, adding 5

MAC address-table move update

configuration guidelines 9

configuring 10

monitoring 12

MAC Authentication Bypass

configure with 802.1X 63

MAC details, displaying 130

MAC extended access lists 14

MAC/PHY configuration status TLV 2

macl 15

macros

See Auto SmartPorts macros

See Auto Smartports macros

See Smartports macros

MACSec

802.1AE Tagging 9

MACsec 2

configuring on an interface 7

defined 1, 2

switch-to-switch security 1

MACsec Key Agreement Protocol

See MKA

main-cpu command 8, 7

management address TLV 2

management options

SNMP 1

Management Port, Ethernet 6

managing software licenses, using PRTU 14

manual preemption, REP, configuring 13

marking

hardware capabilities 23, 57

marking action drivers 21, 55

marking network traffic 18, 52

marking support, multi-attribute 22, 56

match ip address command 8, 10, 12, 13

maximum aging time (STP)

configuring 18

MDA

configuration guidelines 23–??

described 23

MEC

configuration 48

described 13

failure 14

Media Access Control Security

See MACsec

member switch

managing 13

member switch, cluster

defined 2

members

automatic discovery 7

meminfo command 6

messages, Ethernet OAM 34

messages, to users through banners 24

Metro features

Y.1731 (AIS and RDI), introduction 12

metro tags 2

MFIB

CEF 6

overview 12

MFIB, IP

displaying 26

MIBs

compiling 4

downloading 3, 4

overview 1

related information 3

SNMP interaction with 4

MKA

configuring policies 6

defined 2

policies 2

replay protection 3

statistics 4

virtual ports 3

MLD Done messages and Immediate-leave 4

MLD messages 2

MLD queries 3

MLD reports 4

MLD Snooping

MLD Done messages and Immediate-leave 4

MLD messages 2

MLD queries 3

MLD reports 4

Multicast client aging robustness 3

Multicast router discovery 3

overview 1

Mode of capturing control packets, selecting 7

modules

checking status 1

powering down 22

monitoring

802.1Q tunneling 23

ACL information 37

Ethernet CFM 32, 33

Ethernet OAM 49

Ethernet OAM protocol 49

Flex Links 12

IGMP

snooping 10

IGMP filters 34

IGMP snooping 14

Layer 2 protocol tunneling 23

MAC address-table move update 12

multicast router interfaces 11

multi-VRF CE 14, 21, 22

MVR 29

object tracking 12

REP 14

traffic flowing among switches 1

tunneling 23

VLAN filters 26

VLAN maps 26

monitoring and troubleshooting

BFD 17

M-record 23

MST

and multiple spanning trees 8, 22

boundary ports 27

BPDUs 23

configuration parameters 26

configuring 28

displaying configurations 32

edge ports 27

enabling 29

hop count 28

instances

configuring parameters 31

description 23

number supported 26

interoperability with PVST+ 23

link type 28

master 27

message age 28

regions 26

restrictions 28

to-SST interoperability 24

MSTP

EtherChannel guard

enabling 6

M-record 23

M-tree 23

MST-to-PVST+ Interoperability (PVST+ simulation) 35

MST-to-PVST+ Interoperability guidelines 35

M-tree 23

MTU size

configuring 34, 35, 44

default 4

MTUS

understanding 32

Multi-authentication

described 23

multiauthentication mode 8

multicast

See IP multicast

Multicast client aging robustness 3

multicast Ethernet loopback (ETH-LB) 29

multicast Ethernet loopback, using 31

Multicast Forwarding Information Base (MFIB) 12

multicast groups

static joins 7

Multicast HA 13

Multicast implementation

HA 13

MFIB 12

S/M, 224/4 13

multicast packets

blocking 2

Multicast router discovery 3

multicast router interfaces, displaying 17

multicast router interfaces, monitoring 11

multicast router ports, adding 7

multicast router table

displaying 24

multicast routers

flood suppression 12

Multicast Storm Control

 

enabling 4

disabling 6

multicast television application, using MVR 21

Multicast VLAN Registration

See MVR

multichassis EtherChannel

see MEC 13

multidomain authentication

See MDA

multidomain authentication mode 7

multioperations scheduling, IP SLAs 5

Multiple AuthorizationAuthentication

configuring 36

Multiple Domain Authentication 36

multiple forwarding paths 8, 22

Multiple Spanning Tree

See MST

multiple VPN routing/forwarding

See multi-VRF CE

multiple-hosts mode 7

multi-VRF CE

components 3

configuration example 17

defined 1

displaying 14, 21, 22

monitoring 14, 21, 22

network components 3

packet-forwarding process 3

MVR

configuration guidelines and limitations 23

configuring global parameters 24

configuring on a trunk port 27

configuring on access ports 26

default configuration 23

displaying information 29

in a multicast television application 21

monitoring 29

setting global parameters 24

N

NAC Layer 2 802.1X authentication, intro 40

NAC Layer 2 IP validation, intro 40

named IPv6 ACLs, configuring

ACLs

configuring named IPv6 ACLs 16

named MAC extended ACLs

ACLs

configuring named MAC extended 14, 15

native VLAN

and 802.1Q tunneling 3

specifying 6

NDAC 9

defined 9

MACsec 1

NEAT

configuring 90

overview 25

neighbor offset numbers, REP 5

NetFlow packet sampling

about 2

NetFlow-lite

clear commands 9

display commands 8

Network Assistant

and VTY 12

configure

enable communication with switch 13, 17

default configuration 3

overview of CLI commands 3

Network Device Admission Control (NDAC) 9

Network Edge Access Topology

See NEAT

network fault tolerance 8, 22

network management

configuring 1

RMON 1

SNMP 1

network performance, measuring with IP SLAs 3

network policy TLV 2, 9

Network Time Protocol

See NTP

network traffic, marking 18, 52

New Software Features in Release 7.7

TDR 3

Next Hop Resolution Protocol

See NHRP

NHRP

support 18

non-fiber-optics interfaces

disabling UDLD 7

non-IP traffic filtering 14, 15

non-RPF traffic

description 10

in redundant configurations (figure) 11

Nonstop Forwarding

See NSF

nonvolatile random-access memory

See NVRAM

normal-range VLANs

See VLANs

NSF

defined 1

guidelines and restrictions 9

operation 4

NSF with SSO supervisor engine redundancy

and CEF 5

overview 3

SSO operation 4

NSF-aware

supervisor engines 3

support 2

NSF-capable

supervisor engines 3

support 2

NTP

associations

authenticating 4

defined 2

enabling broadcast messages 7

peer 6

server 6

default configuration 4

displaying the configuration 11

overview 2

restricting access

creating an access group 9

disabling NTP services per interface 10

source IP address, configuring 10

stratum 2

synchronizing devices 6

time

services 2

synchronizing 2

ntroduction

PPPoE Intermediate Agent 41

Storm Control 42

uRPF Strict Mode 42

NVRAM

saving settings 10

O

OAM

client 34

features 34

sublayer 34

OAM manager

configuring 52

with CFM and Ethernet OAM 51

OAM PDUs 35

OAM protocol data units 33

OBFL, displaying for the 9000W AC 4

object tracking

monitoring 12

OGACLs 3

OIR

overview 38

on-demaind online diagnostics 1

online diagnostic

troubleshooting 8

Online Diagnostics 1

online diagnostics

configuring on-demaind 1

data path, displaying test results 6

displaying tests and test results 4

linecard 8

scheduling 2

starting and stopping tests 3

online insertion and removal

See OIR

Open Shortest Path First

See OSPF

operating system images

See system images

Option 82

enabling DHCP Snooping 10

OSPF

area concept 19

description 18

for IPv6 6

OSPF for Routed Access, introduction 21

OSPF, introduction 18

P

packet type filtering

overview 14

SPAN enhancement 14

packets

modifying 9

PACL

using with access-group mode 32

PACL configuration guidelines 30

PACL with VLAN maps and router ACLs 34

PAgP

understanding 4

PAgP, dual-active detection 23

passwords

configuring enable password 14

configuring enable secret password 14

encrypting 22

in clusters 8

recovering lost enable password 25

setting line password 14

PBR (policy-based routing)

configuration (example) 16

enabling 7, 10

features 2

overview 1

route maps 2

route-map processing logic 3

when to use 6

PE to CE routing, configuring 9

percentage thresholds in tracked lists 6

Permanent Right-To_Use 14

per-port and VLAN Access Control List 19

per-port per-VLAN QoS

enabling 36, 70

overview 10

Per-User ACL and Filter-ID ACL, configure 48

Per-VLAN Rapid Spanning Tree 6

enabling 20

overview 6

physical layer 3 interfaces 2

Physical Layer 3 interfaces, configuring 12

PIM

configuring dense mode 15

configuring sparse mode 15

displaying information 24

displaying statistics 28

enabling sparse-dense mode 15, 16

overview 3

PIM on an interface, enabling 15

PIM-DM 3

PIM-SM 3

PIM-SSM mapping, enabling 17

ping

executing 8

overview 7

ping command 8, 24

PoE 7, 8

configuring power consumption for single device 5, 16

configuring power consumption, powered devices 5

displaying operational status for an interface 6

Enhanced PoE support on E-series 15

policing and monitoring 12

power consumption for powered devices

Intelligent Power Management 4

power management modes 2

powering down a module 22

PoE policing

configuring errdisable recovery 14

configuring on an interface 13

displaying on an interface 14

power modes 12

point-to-point

in 802.1X authentication (figure) 3

policing

how to implement 18, 52

See QoS policing

policing IPv6 control traffic 20

policing, PoE 12

policy associations, QoS on Sup 6-E 39, 73

policy map marking action, configuring 23, 57

policy-map command 16, 51

port ACLs

and voice VLAN 5

defined 3

Port Aggregation Protocol

see PAgP

port cost (STP)

configuring 15

port description TLV 2

port numbering with TwinGig Convertors 13

port priority

configuring MST instances 31

configuring STP 13

port security

aging 5

configuring 7

displaying 28

guidelines and restrictions 33

on access ports 7, 22

on private VLAN 14

host 14

promiscuous 16

topology 15, 18, 32

on trunk port 17

guidelines and restrictions 15, 18, 32

port mode changes 22

on voice ports 22

sticky learning 5

using with 802.1X 19

violations 6

with 802.1X Authentication 32

with DHCP and IP Source Guard 31

with other features 33

port states

description 5

port VLAN ID TLV 2

port-based authentication

802.1X with voice VLAN 22

Authentication Failed VLAN assignment 17

authentication server

defined 2

changing the quiet period 87

client, defined 3, 2

configuration guidelines 30, 6

configure ACL assignments and redirect URLs 40

configure switch-to-RADIUS server communication 34

configure with Authentication Failed 73

configure with Critical Authentication 65

configure with Guest-VLANs 60

configure with MAC Authentication Bypass 63

configure with VLAN User Distribution 71

configure with Voice VLAN 75

configuring

Multiple Domain Authentication and Multiple Authorization 36

RADIUS server 10

RADIUS server parameters on the switch 9

configuring Fallback Authentication 80

configuring Guest-VLAN 34

configuring manual re-authentication of a client 97

configuring with Unidirectional Controlled Port 69

controlling authorization state 5

default configuration 29, 6

described 1

device roles 2

displaying statistics 127, 14

enabling 30

802.1X authentication 9

enabling multiple hosts 85

enabling periodic re-authentication 84

encapsulation 3

host mode 6

how 802.1X fails on a port 27

initiation and message exchange 4

method lists 30

modes 6

multidomain authentication 23

multiple-hosts mode, described 7

port security

multiple-hosts mode 7

ports not supported 5

pre-authentication open access 8

resetting to default values 97

setting retransmission number 89

setting retransmission time 88

switch

as proxy 2

switch supplicant

configuring 90

overview 25

topologies, supported 27

using with ACL assignments and redirect URLs 20

using with port security 19

voice aware 802.1x security

configuring 77

described 22, 76

with Critical Authentication 14

with Guest VLANs 11

with MAC Authentication Bypass 12

with Unidirectional Controlled Port 15

with VLAN assignment 10

with VLAN User Distribution 16

port-channel

see EtherChannel

port-channel interfaces

See also EtherChannel

creating 48, 8

overview 2

port-channel load-balance

command 14, 16

command example 16

port-channel load-balance command 19

PortFast

and MST 23

configuring or enabling 23

overview 7

PortFast BPDU filtering

and MST 23

overview 16

PortFast Edge BPDU Filtering 17

ports

blocking 1

checking status 2

dynamic VLAN membership

example 28

reconfirming 25, 26

forwarding, resuming 3

REP 6

See also interfaces

power

inline 5

power dc input command 21

power handling for Supervisor Engine II-TS 12

power inline command 3

power inline consumption command 5

power management

Catalyst 4500 series 7

Catalyst 4500 Switch power supplies 14

Catalyst 4948 series 23

configuring combined mode 13

configuring redundant mode 12

overview 1

redundancy 7

power management for Catalyst 4500 Switch

combined mode 9

redundant mode 9

power management limitations in Catalyst 4500 Switch 10

power management mode

selecting 10

power management TLV 2, 3, 9

power negotiation

through LLDP 11

power policing, displaying on an interface 14

power redundancy-mode command 13

power supplies

available power for Catalyst 4500 Switch 14

fixed 8

variable 8, 23

powered devices, configuring power consumption 5

Power-On-Self-Test diagnostics 10, 19

Power-On-Self-Test for Supervisor Engine V-10GE 12

pre-authentication open access 8

pre-authentication open access. See port-based authentication.

preempt delay time, REP 5

primary edge port, REP 4

primary VLANs 2, 4

associating with secondary VLANs 16

configuring as a PVLAN 15

priority

overriding CoS of incoming frames 4

priority queuing, QoS on Sup 6-E 30, 64

private VLAN

configure port security 14, 15

enabling DHCP Snooping 12

private VLANs

across multiple switches 5

and SVIs 10

benefits of 2

community ports 3

community VLANs 2, 3

default configuration 12

end station access to 3

isolated port 4

isolated VLANs 2, 3, 4

ports

community 3

isolated 4

promiscuous 4

primary VLANs 2, 4

promiscuous ports 4

secondary VLANs 2

subdomains 2

traffic in 9

privileged EXEC mode 5

privileges

changing default 23

configuring levels 23

exiting 24

logging in 24

promiscuous ports

configuring PVLAN 17

defined 4

setting mode 24

protocol timers 4

provider edge devices 2

PRTU, managing software licenses 14

pruning, VTP

See VTP pruning

pseudobridges

description 25

PVACL 19

PVID (port VLAN ID)

and 802.1X with voice VLAN ports 22

PVLAN promiscuous trunk port

configuring 11, 17, 21

PVLANs

802.1q support 14

across multiple switches 5

configuration guidelines 12

configure port security 14, 16, 18

configure port security in a wireless setting 32

configuring 11

configuring a VLAN 15

configuring promiscuous ports 17

host ports

configuring a Layer 2 interface 18

setting 24

overview 1

permitting routing, example 23

promiscuous mode

setting 24

setting

interface mode 24

PVST+ simulation 36

Q

QoS

classification 6–??

definitions 3

enabling per-port per-VLAN 36, 70

overview 1

overview of per-port per-VLAN 10

packet modification 9

traffic shaping 9

See also COS; DSCP values; transmit queues

QoS active queue management

tracking queue length 9

QoS labels

definition 3

QoS marking

description 5

QoS on Sup 6-E

Active Queue management via DBL 34, 68

active queue management via DBL 27, 34, 61, 68

classification 16, 50

configuring 13, 47

configuring CoS mutation 45, 79

configuring the policy map marking action 23, 57

hardware capabilities for marking 23, 57

how to implement policing 18, 52

marking action drivers 21, 55

marking network traffic 18, 52

MQC-based QoS configuration 13, 48

multi-attribute marking support 22, 56

platform hardware capabilities 15, 49

platform restrictions 18, 52

platform-supported classification criteria and QoS features 13, 14, 48

policing 17, 51

policy associations 39, 73

prerequisites for applying a service policy 15, 49

priority queuing 30, 64

queue-limiting 31, 65

restrictions for applying a service policy 15, 50

shaping 25, 59

sharing(bandwidth) 27, 61

sharing(blandwidth), shapring, and priority queuing 25, 59

software QoS 40, 74

traffic marking procedure flowchart 21, 55

QoS policing

definition 5

described 8

QoS policy

attaching to interfaces 8

QoS service policy

prerequisites 15, 49

restrictions for applying 15, 50

QoS transmit queues

burst 9

maximum rate 9

sharing link bandwidth 9

quad-supervisor

uplink forwarding 6

Quality of service

See QoS

queueing 8

queue-limiting, QoS on Sup 6-E 31, 65

R

RA Guard

configuring 38

deployment 38

examples 39

introduction 37

usage guidelines 40

RADIUS

attributes

vendor-proprietary 116

vendor-specific 114

change of authorization 100

configuring

accounting 113

authentication 108

authorization 112

communication, global 106, 114

communication, per-server 105, 106

multiple UDP ports 106

default configuration 105

defining AAA server groups 110

displaying the configuration 118

identifying the server 105

limiting the services to the user 112

method list, defined 105

operation of 99

server load balancing 118

suggested network environments 98

tracking services accessed by user 113

understanding 98

RADIUS Change of Authorization 100

RADIUS server

configure to-Switch communication 34

configuring settings 36

parameters on the switch 34

RADIUS, controlling switch access with 98

range command 4

range macros

defining 11

ranges of interfaces

configuring 4

Rapid Spanning Tree

See RSTP

rcommand command 13

reachability, tracking IP SLAs IP host 9

re-authentication of a client

configuring manual 97

enabling periodic 84

redirect URLs, port-based authentication 20

reduced MAC address 2

redundancy

configuring 7

guidelines and restrictions 5

changes made through SNMP 11

NSF-aware support 2

NSF-capable support 2

overview 2

redundancy command 8, 7

understanding synchronization 4, 5

redundancy (NSF) 1

configuring

BGP 11

CEF 11

EIGRP 16

IS-IS 14

OSPF 13

routing protocols 5

redundancy (RPR)

route processor redundancy 2, 3

synchronization 4, 5

redundancy (SSO)

redundancy command 10

route processor redundancy 3

synchronization 5

reload command 28, 29

Remote Authentication Dial-In User Service

See RADIUS

remote failure indications 34

remote loopback, Ethernet OAM 34, 37

Remote Network Monitoring

See RMON

rendezvous point, configuring 17

rendezvous point, configuring single static 21

REP

administrative VLAN 8

administrative VLAN, configuring 9

and STP 6

configuration guidelines 7

configuring interfaces 10

convergence 4

default configuration 7

manual preemption, configuring 13

monitoring 14

neighbor offset numbers 5

open segment 2

ports 6

preempt delay time 5

primary edge port 4

ring segment 2

secondary edge port 4

segments 1

characteristics 2

SNMP traps, configuring 14

supported interfaces 1

triggering VLAN load balancing 6

verifying link integrity 4

VLAN blocking 13

VLAN load balancing 4

replication

description 9

report suppression, IGMP

disabling 10

reserved-range VLANs

See VLANs

reset command 3

resetting a switch to defaults 33

resetting an interface to default configuration 45

Resilient Ethernet ProtocolLSee REP

responder, IP SLAs

described 4

enabling 7

response time, measuring with IP SLAs 4

restricting access

NTP services 8

RADIUS 98

TACACS+ 15

retransmission number

setting in 802.1X authentication 89

retransmission time

changing in 802.1X authentication 88

RFC

1157, SNMPv1 2

1305, NTP 2

1757, RMON 2

1901, SNMPv2C 2

1902 to 1907, SNMPv2 2

2273-2275, SNMPv3 2

RFC 5176 Compliance 100

RIP

description 19

for IPv6 6

RIP, introduction 19

RMON

default configuration 3

displaying status 6

enabling alarms and events 3

groups supported 2

overview 1

ROM monitor

boot process and 26

CLI 7

commands 2–3

debug commands 5–6

entering 1

exiting 6

overview 1

root bridge

configuring 9

selecting in MST 22

root guard

and MST 23

enabling 2

overview 2

route maps

defining 8, 10, 12

PBR 2

route targets

VPN 3

routed packets

ACLs 28

route-map (IP) command 8, 10, 12

router ACLs

description 41, 3

using with VLAN maps 27

router ACLs, using PACL with VLAN maps 34

Routing Information Protocol

See RIP

RPF

See Unicast RPF

RSPAN

configuration guidelines 16

destination ports 5

IDS 2

monitored ports 4

monitoring ports 5

received traffic 3

sessions

creating 17

defined 3

limiting source traffic to specific VLANs 23

monitoring VLANs 21

removing source (monitored) ports 20

specifying monitored ports 17

source ports 4

transmitted traffic 4

VLAN-based 5

RSTP

compatibility 23

description 22

port roles 24

port states 24

S

S/M, 224/4 13

SAID

See 802.10 SAID

SAP

defined 9

negotiation 9

support 1

scheduling 8

scheduling, IP SLAs operations 5

secondary edge port, REP 4

secondary root switch 12

secondary VLANs 2

associating with primary 16

permitting routing 23

security

configuring 1

Security Association Identifier

See 802.10 SAID

Security Exchange Protocol

See SAP

selecting a power management mode 10

selecting X2/TwinGig Convertor Mode 14

sequence numbers in log messages 7

server IDs

description 23

service policy, configure class-level queue-limit 31, 65

service-policy input command 2

service-provider networks

and customer VLANs 2

session keys, MKA 2

set default interface command 9, 11

set interface command 8, 10

set ip default next-hop command 9, 11

set ip next-hop command 8, 10, 16

set-request operation 4

severity levels, defining in system messages 8

shaping, QoS on Sup 6-E 25, 59

sharing(bandwidth), QoS on Sup 6-E 27, 61

Shell functions

See Auto SmartPorts macros

See Auto Smartports macros

Shell triggers

See Auto SmartPorts macros

See Auto Smartports macros

show adjacency command 10

show boot command 32

show catalyst4000 chassis-mac-address command 3

show cdp command 2, 3

show cdp entry command 4

show cdp interface command 3

show cdp neighbors command 4

show cdp traffic command 4

show ciscoview package command 48

show ciscoview version command 48

show cluster members command 13

show configuration command 29

show debugging command 4

show environment command 2

show history command 4

show interfaces command 34, 35, 42, 44

show interfaces status command 2

show ip cef command 8

show ip eigrp interfaces command 20

show ip eigrp neighbors command 20

show ip eigrp topology command 20

show ip eigrp traffic command 20

show ip interface command 24

show ip local policy command 12

show ip mroute command 24

show ip pim interface command 24

show l2protocol command 18

show lldp traffic command 15

show mac-address-table address command 3

show mac-address-table interface command 3

show mls entry command 8

show module command 1, 6

show PoE consumed 8

show power inline command 6

show power supplies command 13

show protocols command 42

show running-config command

adding description for an interface 29

checking your settings 9

displaying ACLs 21, 23, 32, 33

show startup-config command 10

show users command 6

show version command 29

shutdown threshold for Layer 2 protocol packets 16

shutdown, command 43

shutting down

interfaces 42

Simple Network Management Protocol

See SNMP

single spanning tree

See SST

single static RP, configuring 21

single-host mode 7

slot numbers, description 2

Slow timer, configuring BFD 16

smart call home 1

description 2

destination profile (note) 5

registration requirements 3

service contract requirements 3

Transport Gateway (TG) aggregation point 2

SMARTnet

smart call home registration 3

Smartports macros

applying global parameter values 8, 14

applying macros 8

applying parameter values 8

configuration guidelines 6, 13

configuring 2

creating 7

default configuration 3, 13

defined 10, 1

displaying 12

tracing 6, 13

SNMP

accessing MIB variables with 4

agent

described 4

disabling 7

and IP SLAs 2

authentication level 10

community strings

configuring 7

overview 4

configuration examples 15

configuration guidelines 6

default configuration 5

enabling 4, 5

engine ID 6

groups 6, 9

host 6

informs

and trap keyword 11

described 5

differences from traps 5

enabling 14

limiting access by TFTP servers 15

limiting system log messages to NMS 9

manager functions 3

notifications 5

overview 1, 4

status, displaying 16

system contact and location 14

trap manager, configuring 13

traps

described 3, 5

differences from informs 5

enabling 11

enabling MAC address notification 31

enabling MAC move notification 33

enabling MAC threshold notification 35

overview 1, 4

types of 11

users 6, 9

versions supported 2

SNMP commands 4

SNMP traps

REP 14

SNMPv1 2

SNMPv2C 2

SNMPv3 2

software

upgrading 13, 12

software configuration register 26

software QoS, on Sup 6-E 40, 74

software switching

description 5

interfaces 6

key data structures used 8

source group tag 4, 10

source IDs

call home event format 22

SPAN

and ACLs 5

configuration guidelines 7

configuring 7–10

destination ports 5

IDS 2

monitored port, defined 4

monitoring port, defined 5

received traffic 3

sessions

defined 3

source ports 4

transmitted traffic 4

VLAN-based 5

SPAN and RSPAN

concepts and terminology 3

default configuration 6

displaying status 24

overview 1

session limits 6

SPAN enhancements

access list filtering 13

configuration example 15

CPU port sniffing 10

encapsulation configuration 12

ingress packets 12

packet type filtering 14

spanning-tree backbonefast command 24

spanning-tree cost command 15

spanning-tree guard root command 2

spanning-tree port-priority command 13

spanning-tree uplinkfast command 20

spanning-tree vlan

command 9

command example 9

spanning-tree vlan command 8

spanning-tree vlan cost command 16

spanning-tree vlan forward-time command 19

spanning-tree vlan hello-time command 18

spanning-tree vlan max-age command 18

spanning-tree vlan port-priority command 13

spanning-tree vlan priority command 17

spanning-tree vlan root primary command 10

spanning-tree vlan root secondary command 12

speed

configuring interface 24

speed command 25, 26, 27

SSO

configuring 10

SSO operation 4

SST

description 22

interoperability 24

static ACL, removing the requirement 30

static addresses

See addresses

static routes

configuring 11

verifying 12

statistics

802.1X 14

displaying 802.1X 127

displaying PIM 28

LLDP 14

LLDP-MED 14

MKA 4

SNMP input and output 16

sticky learning

configuration file 6

defined 5

disabling 6

enabling 5

saving addresses 6

sticky MAC addresses

configuring 7

defined 4

storing captured packets to a.pcap file, Wireshark 8

Storm Control

displaying 6

enabling Broadcast 3

enabling Multicast 4

hardware-based, implementing 2

overview 1

software-based, implementing 2

STP

and REP 6

bridge ID 2

configuring 7–20

creating topology 5

defaults 7

disabling 20

enabling 8

enabling extended system ID 9

enabling Per-VLAN Rapid Spanning Tree 20

EtherChannel guard

disabling 7

forward-delay time 19

hello time 17

Layer 2 protocol tunneling 13

maximum aging time 18

overview 1, 3

per-VLAN rapid spanning tree 6

port cost 15

port priority 13

root bridge 9

stratum, NTP 2

stub routing (EIGRP)

benefits 18

configuration tasks 18

configuring 14

overview 13, 14

restrictions 18

verifying 19

subdomains, private VLAN 2

summer time 13

supervisor engine

accessing the redundant 14

configuring 8–13

copying files to standby 14

default configuration 1

default gateways 11

environmental monitoring 1

redundancy 1

ROM monitor 26

startup configuration 25

static routes 11

synchronizing configurations 11, 10

Supervisor Engine 7L-E, selecting the uplink port 22

Supervisor Engine II-TS

insufficient inline power handling 22, 12

Smartports macros

See also Auto Smartports macros

SVI Autostate Exclude

understanding 3

SVI Autostate exclude

configuring 8

S-VLAN 2, 7

switch 2

switch access with RADIUS, controlling 98

switch ports

See access ports

switched packets

and ACLs 27

Switched Port Analyzer

See SPAN

switchport

show interfaces 34, 35, 44

switchport access vlan command 5, 7

switchport block multicast command 2

switchport block unicast command 2

switchport mode access command 7

switchport mode dot1q-tunnel command 6

switchport mode dynamic command 5

switchport mode trunk command 5

switchport trunk allowed vlan command 6

switchport trunk encapsulation command 5

switchport trunk native vlan command 6

switchport trunk pruning vlan command 6

switch-to-RADIUS server communication

configuring 34

sysret command 5

system

reviewing configuration 10

settings at startup 27

system alarms

overview 6

system and network statistics, displaying 24

system capabilities TLV 2

system clock

configuring

daylight saving time 13

manually 11

summer time 13

time zones 12

displaying the time and date 12

overview 2

See also NTP

system description TLV 2

system images

loading from Flash memory 30

modifying boot field 27

specifying 30

system message logging

default configuration 3

defining error message severity levels 8

disabling 3

displaying the configuration 12

enabling 4

facility keywords, described 12

level keywords, described 8

limiting messages 9

message format 2

overview 1

sequence numbers, enabling and disabling 7

setting the display destination device 4

synchronizing log messages 5

timestamps, enabling and disabling 6

UNIX syslog servers

configuring the daemon 10

configuring the logging facility 11

facilities supported 12

system MTU

802.1Q tunneling 5

maximums 5

system name

manual configuration 22

See also DNS

system name TLV 2

system prompt, default setting 21

T

TACACS+ 1

accounting, defined 16

authentication, defined 16

authorization, defined 16

configuring

accounting 21

authentication key 18

authorization 21

login authentication 19

default configuration 18

displaying the configuration 22

identifying the server 18

limiting the services to the user 21

operation of 17

overview 15

tracking services accessed by user 21

tagged packets

802.1Q 3

Layer 2 protocol 13

TCAM programming and ACLs 7

for Sup II-Plust thru V-10GE 7

TCAM programming and ACLs for Sup 6-E 10

TDR

checking cable connectivity 3

enabling and disabling test 3

guidelines 3

Telnet

accessing CLI 2

disconnecting user sessions 7

executing 5

monitoring user sessions 6

telnet command 6

templates, Ethernet OAM 45

Terminal Access Controller Access Control System Plus

See TACACS+

TFTP

configuration files in base directory 5

configuring for autoconfiguration 4

limiting access by servers 15

TFTP download

See also console download

threshold monitoring, IP SLAs 6

time

See NTP and system clock

Time Domain Reflectometer

See TDR

time exceeded messages 9

time zones 12

timer

See login timer

timestamps in log messages 6

TLV

host presence detection 8

TLVs

defined 7, 2

LLDP-MED 2

Token Ring

media not supported (note) 5, 9

Topology change notification processing

MLD Snooping

Topology change notification processing 4

TOS

description 4

trace command 9

traceroute

See IP traceroute

See Layer 2 Traceroute

traceroute mac command 11

traceroute mac ip command 11

track state, tracking IP SLAs 9

tracked lists

configuring 3

types 3

tracked objects

by Boolean expression 4

by threshold percentage 6

by threshold weight 5

tracking interface line-protocol state 2

tracking IP routing state 2

tracking objects 1

tracking process 1

traffic

blocking flooded 2

traffic control

using ACLs (figure) 4

using VLAN maps (figure) 6

traffic marking procedure flowchart 21, 55

traffic shaping 9

translational bridge numbers (defaults) 5

traps

configuring MAC address notification 31

configuring MAC move notification 33

configuring MAC threshold notification 35

configuring managers 11

defined 3

enabling 31, 33, 35, 11

notification types 11

overview 1, 4

troubleshooting

with CiscoWorks 4

with system message logging 1

with traceroute 8

troubleshooting high CPU due to ACLs 7

trunk failover

See link-state tracking

trunk ports

configure port security 17

configuring PVLAN 19–21

trunks

802.1Q restrictions 4

configuring 5

configuring access VLANs 5

configuring allowed VLANs 6

default interface configuration 5

enabling to non-DTP device 4

specifying native VLAN 6

understanding 3

trustpoint 3

tunnel ports

802.1Q, configuring 5

described 2

incompatibilities with other features 5

tunneling

defined 1

TwinGig Convertors

limitations on using 14

port numbering 13

selecting X2/TwinGig Convertor mode 14

type length value

See TLV

type of service

See TOS

U

UDLD

configuring probe message interval per-interface 8

default configuration 3

disabling on fiber-optic interfaces 7

disabling on non-fiber-optic interfaces 7

displaying link status 9

enabling globally 5

enabling per-interface 6

modes of operation 3

resetting disabled LAN interfaces 8

use case 2

UDLD, overview 1

UDP jitter operation, IP SLAs 8

UDP jitter, configuring 9

unauthorized ports with 802.1X 5

unicast

See IP unicast

unicast flood blocking

configuring 1

unicast MAC address filtering

and adding static addresses 38

and broadcast MAC addresses 37

and CPU packets 37

and multicast addresses 37

and router MAC addresses 37

configuration guidelines 37

described 37

unicast MAC address filtering, configuring

ACLs

configuring unicast MAC address filtering 14

Unicast RPF (Unicast Reverse Path Forwarding)

applying 5

BGP attributes

caution 4

CEF

requirement 2

tables 7

configuring 9

(examples) ??–12

BOOTP 8

DHCP 8

enterprise network (figure) 6

prerequisites 9

routing table requirements 7

tasks 9

verifying 10

deploying 5

description 22, 1

disabling 11

enterprise network (figure) 6

FIB 2

implementing 4

packets, dropping (figure) 4

prerequisites 9

restrictions

basic 8

routing asymmetry 7

routing asymmetry (figure) 8

routing table requirements 7

security policy

applying 5

attacks, mitigating 5

deploying 5

tunneling 5

source addresses, validating 3

(figure) 3, 4

failure 3

traffic filtering 5

tunneling 5

validation

failure 3, 4

packets, dropping 3

source addresses 3

verifying 10

unicast traffic

blocking 2

Unidirectional Controlled Port, configuring 802.1X 69

unidirectional ethernet

enabling 2

example of setting 2

overview 1

UniDirectional Link Detection Protocol

See UDLD

Universal PoE, configuring 16

UNIX syslog servers

daemon configuration 10

facilities supported 12

message logging configuration 11

uplink forwarding

quad-supervisor 6

uplink mode, selecting on supervisor engine 6-E 17

uplink port, selecting on a supervisor engine 7L-E 22

UplinkFast

and MST 23

enabling 23

MST and 23

overview 19

usage examples, Wireshark 18

user EXEC mode 5

user sessions

disconnecting 7

monitoring 6

user-defined event triggers

configuring, 802.1X-based 8

configuring, MAC address-based 9

User-defined triggers and built-in macros, configuring mapping 9

V

VACLs

Layer 4 port operations 10

virtual configuration register 3

virtual LANs

See VLANs

virtual ports, MKA 3

Virtual Router Redundancy Protocol, introduction 23

Virtual Switch System(VSS), displaying EtherChannel to 20

VLAN ACLs

See VLAN maps

VLAN blocking, REP 13

vlan command 6

vlan dot1q tag native command 4

VLAN ID

service provider 8

VLAN ID translation

See VLAN mapping

VLAN ID, discovering 44

VLAN load balancing

REP 4

VLAN load balancing on flex links 2

configuration guidelines 5

VLAN load balancing, triggering 6

VLAN Management Policy Server

See VMPS

VLAN mapping

1-to-1 7

1-to-1, configuring 10

configuration guidelines 9

configuring 10

configuring on a trunk port 10

default 9

described 2, 7

selective QinQ 8

selective Q-in-Q, configuring 12

traditional QinQ 8

traditional Q-in-Q, configuring 11

types of 7

VLAN maps

applying to a VLAN 23

configuration example 24

configuration guidelines 20

configuring 19

creating and deleting entries 20

defined 41

denying access example 25

denying packets 21

displaying 26

order of entries 20

permitting packets 21

router ACLs and 27

using (figure) 5

using in your network 23

VLAN maps, PACL and Router ACLs 34

VLAN Trunking Protocol

See VTP

VLAN trunks

overview 3

VLAN User Distribution, configuring 802.1X 71

VLANs

allowed on trunk 6

configuration guidelines 3

configuring 5

configuring as Layer 3 interfaces 8

customer numbering in service-provider networks 3

default configuration 4

description 11

extended range 3

IDs (default) 4

interface assignment 7

limiting source traffic with RSPAN 23

monitoring with RSPAN 21

name (default) 4

normal range 3

overview 1

reserved range 3

See also PVLANs

VMPS

configuration file example 31

configuring dynamic access ports on client 24

configuring retry interval 26

database configuration file 31

dynamic port membership

example 28

reconfirming 25, 26

reconfirming assignments 25

reconfirming membership interval 26

server overview 20

VMPS client

administering and monitoring 27

configure switch

configure reconfirmation interval 26

dynamic ports 24

entering IP VMPS address 24

reconfirm VLAM membership 25

reconfirmation interval 26

default configuration 23

dynamic VLAN membership overview 23

troubleshooting dynamic port VLAN membership 28

VMPS server

fall-back VLAN 22

illegal VMPS client requests 22

overview 20

security modes

multiple 22

open 21

secure 21

voice aware 802.1x security

port-based authentication

configuring 77

described 22, 76

voice interfaces

configuring 1

Voice over IP

configuring 1

voice ports

configuring VVID 3

voice traffic 2, 5

voice VLAN

IP phone data traffic, described 2

IP phone voice traffic, described 2

voice VLAN ports

using 802.1X 22

Voice VLAN, configure 802.1X 75

VPN

configuring routing in 8

forwarding 3

routes 2

routing and forwarding table

See VRF

VRF

defining 3

tables 1

VRF-aware services

ARP 6, 15, 17

configuring 6, 15

ftp 16

ping 15

tftp 16

traceroute 16

uRPF 16

VRF-lite

description 22

VSS

dual-active detection

displaying 54

Enhanced PAgP, advantages 23

enhanced PAgP, configuring 52

Enhanced PAgP, description 23

fast-hello, configuring 53

VTP

client, configuring 16

configuration guidelines 12

default configuration 13

disabling 16

Layer 2 protocol tunneling 13

monitoring 19

overview 7

pruning

configuring 15

See also VTP version 2

server, configuring 16

statistics 19

transparent mode, configuring 16

version 2

enabling 15

VTP advertisements

description 9

VTP domains

description 8

VTP modes 8

VTP pruning

overview 10

VTP versions 2 and 3

overview 9

See also VTP

VTY and Network Assistant 12

VVID (voice VLAN ID)

and 802.1X authentication 22

configuring 3

W

WCCP

configuration examples 9

configuring on a router 2, 13

features 3

restrictions 5

service groups 5

Web Cache Communication Protocol

See WCCP 1

web cache services

description 4

web caches

See cache engines

web caching

See web cache services

See also WCCP

web-based authentication

authentication proxy web pages 4

description 43, 14, 1

web-based authentication, interactions with other features 4

weight thresholds in tracked lists 5

Wireshark

activating and deactivating, capture points, conceptual 10

attachment points 6

capture filter 7

capture points 6

core system filter 7

decoding and displaying packets 9

display filter 7

feature interactions 10

filters 6

storing captured packets to a.pcap filter 8

usage examples 18

Wireshark, about 5

Wireshark, activating and deactivating a capture point 14

Wireshark, defining/modifying/deleting a capture point 12

Wireshark, displaying information 14

WS-X46490-CSFP-E, support on a 10-slot chassis 17

X

X.509v3 Certificates for SSH Authentication

Overview 2

Y

Y.1731

default configuration 29

described 27

ETH-AIS

Ethernet Alarm Signal function (ETH-AIS)

28

ETH-RDI 28

multicast Ethernet loopback 31

multicast ETH-LB 29

terminology 27

Index

Security Exchange Protocol

See SXP

Numerics

10/100 autonegotiation feature, forced 25

10-Gigabit Ethernet or Gigabit Ethernet ports

deploy on WS-X4606-10GE-E and Sup 6-E 13

10-Gigabit Ethernet port

deploy with Gigabit Ethernet SFP ports 12, 13

10-slot chassis, support for WS-X46490-CSFP-E 17

1400 W DC Power supply

special considerations 21

1400 W DC SP Triple Input power supply

special considerations 22

802.10 SAID (default) 4

802.1AE

standard 2

802.1Q

trunks 6

tunnel ports with other features 5

tunneling

compatibility with other features 5

defaults 3

described 2

802.1Q VLANs

trunk restrictions 4

802.1s

See MST

802.1w

See MST

802.1X

See port-based authentication

802.1X authentication

Authentication Failed VLAN assignment 17

for Critical Authentication 14

for guest VLANs 11

for MAC Authentication Bypass 12

for Unidirectional Controlled Port 15

VLAN User Distribution 16

web-based authentication 14

with port security 19

with VLAN assignment 10

with voice VLAN ports 22

802.1X Host Mode 6

multiauthentication mode 8

multidomain authentication mode 7

single-host 7

802.1x-REV 2

802.3ad

See LACP

9000W AC, displaying OBFL 4

A

AAA 1

AAA (authentication, authorization, and accounting). See also port-based authentication. 1

abbreviating commands 5

about Wireshark 5

access control entries

See ACEs

access control entries and lists 1

access list filtering, SPAN enhancement 13

access lists

using with WCCP 8

access ports

and Layer 2 protocol tunneling 15

configure port security 7, 22

configuring 7

access VLANs 5

access-group mode, configuring on Layer 2 interface 33

access-group mode, using PACL with 32

accounting

with RADIUS 113

with TACACS+ 16, 21

ACEs

ACLs 2

IP 41, 2

Layer 4 operation restrictions 11

ACEs and ACLs 1

ACL assignments and redirect URLs, configure 40

ACL assignments, port-based authentication 20

ACL configuration, displaying a Layer 2 interface 34

ACLs

ACEs 2

and SPAN 5

and TCAM programming for Sup 6-E 10

and TCAM programming for Sup II-Plus thru V-10GE 7

applying IPv6 ACLs to a Layer 3 interface 18

applying on routed packets 28

applying on switched packets 27

compatibility on the same switch 3

configuring with VLAN maps 27

CPU impact 13

downloadable 7

hardware and software support 6

IP, matching criteria for port ACLs 5

MAC extended 14

matching criteria for router ACLs 4

port

and voice VLAN 5

defined 3

processing 13

selecting mode of capturing control packets 7

troubleshooting high CPU 7

types supported 3

understanding 2

VLAN maps 5

ACLs and VLAN maps, examples 21

ACLs, applying to a Layer 2 interface 33

acronyms, list of 1

action drivers, marking 21, 55

activating and deactivating a capture point, Wireshark 14

activating and deactivating Wiresharkcapture points, conceptual, Wireshark 10

active queue management 9

active queue management via DBL, QoS on Sup 6-E 34, 68

active traffic monitoring, IP SLAs 1

adding members to a community 9

address resolution 44

addresses

displaying the MAC table 44

dynamic

changing the aging time 30

defined 28

learning 29

removing 31

IPv6 2

MAC, discovering 44

See MAC addresses

static

adding and removing 36

defined 28

adjacency tables

description 2

displaying statistics 10

administrative VLAN

REP, configuring 9

administrative VLAN per segment 9

administrative VLAN, REP 8

advertisements

LLDP 7, 2

advertisements, VTP

See VTP advertisements

aggregation switch, enabling DHCP snooping 9

aging time

MAC address table 30

All Auth manager sessions on the switch authorized for a specified authentication method 128

All Auth manager sessions, displaying summary 128

ANCP client

enabling and configuring 2

guidelines and restrictions 5

identify a port with DHCP option 82 4

identify a port with protocol 2

overview 1

ANCP protocol

identifying a port with 2

applying IPv6 ACLs to a Layer 3 interface 18

AQM via DBL, QoS on Sup 6-E 34, 68

archiving crashfiles information 8

ARP

defined 44

table

address resolution 44

managing 44

asymmetrical links, and 802.1Q tunneling 3

attachment points, Wireshark 6

attributes, RADIUS

vendor-proprietary 116

vendor-specific 114

Auth manager session for an interface, verifying 128

Auth manager summary, displaying 128

authentication

NTP associations 4

RADIUS

key 106

login 108

See also port-based authentication

TACACS+

defined 16

key 18

login 19

Authentication Failed, configuring 80.1X 73

Authentication methods registered with the Auth manager, determining 127

authentication open comand 8

authentication proxy web pages 4

authentication server

defined 3

RADIUS server 3

Authentication, Authorization, and Accounting (AAA) 1

authoritative time source, described 2

authorization

with RADIUS 112

with TACACS+ 16, 21

authorized and unauthorized ports 5

authorized ports with 802.1X 5

Auto Identity

Built-in Policies 4

Class Map Templates 4

Global Template 2

Interface Templates 3

Overview 2

Parameter Maps 5

Service Templates 5

Auto SmartPorts built-in macros

configuring parameters 6

Auto SmartPorts macros

built-in macros 4

configuration guidelines 5

default configuration 4

defined 1

displaying 13

enabling 3

IOS shell 2, 10

Auto Smartports macros

defined 2

Auto SmartPorts user-defined macros

configuring 10

autoconfiguration 2

automatic discovery

considerations 7

Auto-MDIX on a port

configuring 37

displaying the configuration 37

overview 36

autonegotiation feature

forced 10/100Mbps 25

auto-sync command 8, 7

Auto SmartPorts macros

See also SmartPorts macros

Auto Smartports macros

See also Smartports macros

B

b command 3

b flash command 3

Baby Giants

interacting with 35

BackboneFast

adding a switch (figure) 3

and MST 23

configuring 23

link failure (figure) 22, 23

not supported MST 23

understanding 21

See also STP

banners

configuring

login 27

message-of-the-day login 24

default configuration 24

when displayed 24

BFD

and hardware support 7

configuration example

BFD in a BGP network 25

BFD in an EIGRP network with echo mode enabled by default 17

BFD in an OSPF network 22

support for static routing 27

configuring

Echo mode 15

session parameters on the interface 8

Slow timer 16

support for BGP 9

support for dynamic routing protocols 9

support for EIGRP 10

support for OSPF 11

support for static routing 13

disabling echo mode without asymmetry 16

monitoring and troubleshooting 17

neighbor relationships 3

operation 3

prerequisites 2

restrictions 2

BGP 17

routing session with multi-VRF CE 9

blocking packets 1

blocking state (STP)

RSTP comparisons (table) 24

Boolean expressions in tracked lists 4

boot bootldr command 32

boot command 28

boot commands 3

boot fields

See configuration register boot fields

boot system command 26, 32

boot system flash command 28

bootstrap program

See ROM monitor

Border Gateway Protocol

See BGP

boundary ports

description 27

BPDU Guard

and MST 23

configuring 23

overview 15

BPDUs

and media speed 2

pseudobridges and 25

what they contain 3

Bridge Assurance 8, 11

bridge ID

See STP bridge ID

bridge priority (STP) 17

bridge protocol data units

See BPDUs

bridging loop 40

Broadcast Storm Control

disabling 5

enabling 3

Built-in macros and user-defined triggers, configuring mapping 9

C

cache engine clusters 1

cache engines 1

cache farms

See cache engine clusters

Call Home

description 24, 1

message format options 2

messages

format options 2

call home 1

alert groups 6

configuring e-mail options 9

contact information 4

default settings 18

destination profiles 5

displaying information 13

mail-server priority 10

pattern matching 8

periodic notification 8

rate limit messages 9

severity threshold 8

smart call home feature 2

SMTP server 9

testing communications 10

call home alert groups

configuring 6

description 6

subscribing 7

call home contacts

assigning information 4

call home destination profiles

attributes 5

configuring 5

description 5

displaying 16

call home notifications

full-txt format for syslog 25

XML format for syslog 28

candidate switch, cluster

defined 12

candidates

automatic discovery 7

capture filter, Wireshark 7

capture points, Wireshark 6

Capturing control packets

selecting mode 7

cautions

Unicast RPF

BGP optional attributes 4

cautions for passwords

encrypting 22

CDP

automatic discovery in communities 7

configuration 2

defined with LLDP 1

displaying configuration 3

enabling on interfaces 3

host presence detection 8

Layer 2 protocol tunneling 13

maintaining 3

monitoring 3

overview 2, 1

cdp enable command 3

CEF

adjacency tables 2

and NSF with SSO 5

configuring load balancing 7

displaying statistics 8

enabling 7, 2

hardware switching 4

load balancing 6

overview 1

software switching 4

certificate authority (CA) 3

CFM

and Ethernet OAM interaction 51

and Ethernet OAM, configuring 51

clearing 31

configuration guidelines 7, 4

configuring crosscheck for VLANs 11

configuring fault alarms 16

configuring port MEP 14

configuring static remote MEP 13, 16, 18

crosscheck 5

defined 2

EtherChannel support 7, 4

fault alarms

configuring 16

IP SLAs support for 6

IP SLAs with endpoint discovers 21

maintenance domain 3

manually configuring IP SLAs ping or jitter 19

measuring network performance 6

monitoring 32, 33

port MEP, configuring 14

remote MEPs 5

static RMEP check 5

static RMEP, configuring 13, 16, 18

Y.1731

described 27

CGMP

overview 2

Change of Authorization, RADIUS 100

channel-group group command 49, 9, 11

Cisco 7600 series Internet router

enabling SNMP 4, 5

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco IOS IP SLAs 2

Cisco IOS NSF-aware

support 2

Cisco IOS NSF-capable support 2

Cisco IP Phones

configuring 2

sound quality 1

Cisco TrustSec

credentials 10

switch-to-switch security

802.1x mode 11

configuration example 14

manual mode 12

Cisco TrustSec Network Device Admission Control

See NDAC

CiscoWorks 2000 4

CIST

description 22

civic location 3

class level, configure in a service policy 31, 65

class of service

See CoS

clear cdp counters command 4

clear cdp table command 3

clear counters command 42

clear ip eigrp neighbors command 19

clearing

Ethernet CFM 31

IP multicast table entries 28

CLI

accessing 2

backing out one level 5

getting commands 5

history substitution 4

managing clusters 13

modes 5

monitoring environments 1

ROM monitor 7

software basics 4

client processes, tracking 1

clients

in 802.1X authentication 3

clock

See system clock

clustering switches

command switch characteristics

and VTY 12

convert to a community 10

managing

through CLI 13

overview 2

planning considerations

CLI 13

passwords 8

CoA Request Commands 102

command modes 5

command switch, cluster

requirements 11

command-line processing 3

commands

b 3

b flash 3

boot 3

confreg 3

dev 3

dir device 3

frame 5

i 3

listing 5

meminfo 6

reset 3

ROM monitor 2–3

ROM monitor debugging 5–6

SNMP 4

sysret 5

common and internal spanning tree

See CIST

common spanning tree

See CST

community of switches

access modes in Network Assistant 9

adding devices 9

communication protocols 8

community name 8

configuration information 9

converting from a cluster 10

host name 8

passwords 8

community ports 3

community strings

configuring 7

overview 4

community VLANs 2, 3

configure as a PVLAN 15

compiling MIBs 4

config terminal command 9

config-register command 29

configurable leave timer,IGMP 4

configuration examples

SNMP 15

configuration files

limiting TFTP server access 15

obtaining with DHCP 6

saving 10

system contact and location information 14

configuration guidelines

CFM 7, 4

Ethernet OAM 35

REP 7

SNMP 6

VLAN mapping 9

configuration register

boot fields

listing value 29

modifying 28

changing from ROM monitor 3

changing settings 28–29

configuring 26

settings at startup 27

configure class-level queue-limit in a service policy 31, 65

configure terminal command 29, 2

configuring access-group mode on Layer 2 interface 33

configuring flow control 29

configuring interface link and trunk status envents 43

configuring named IPv6 ACLs 16

configuring named MAC extended ACLs 14, 15

configuring unicast MAC address filtering 14

configuring VLAN maps 19

confreg command 3

Connectivity Fault Management

See CFM

console configuration mode 5

console download 4–5

console port

disconnecting user sessions 7

monitoring user sessions 6

contact information

assigning for call home 4

Control Plane Policing

and Layer 2 Control packet QoS, configuration example 18

configuration guidelines and restrictions 9

configuring for control plane traffic 4

configuring for data plane and management plan traffic 6

defaults 4

general guidelines 4

monitoring 10

understanding 2

control protocol, IP SLAs 4

controlling switch access with RADIUS 98

convergence

REP 4

copy running-config startup-config command 10

copy system:running-config nvram:startup-config command 32

core system filter, Wireshark 7

CoS

definition 3

figure 2

overriding on Cisco IP Phones 4

priority 4

counters

clearing MFIB 29

clearing on interfaces 42

CPU port sniffing 10

CPU, impact of ACL processing 13

crashfiles information, archiving 8

Critical Authentication

configure with 802.1X 65

crosscheck, CFM 5, 11

CST

description 25

IST and 22

MST and 22

CTS Fields 6

customer edge devices 2

C-VLAN 2, 7

D

database agent

configuration examples 15

enabling the DHCP Snooping 13

daylight saving time 13

debug commands, ROM monitor 5–6

decoding and displaying packets, Wireshark 9

default configuration

802.1X 29

banners 24

DNS 23

Ethernet OAM 35

IGMP filtering 30

IGMP snooping 5, 6

IP SLAs 6

IPv6 7

Layer 2 protocol tunneling 16

LLDP 5

MAC address table 30

MVR 23

NTP 4

private VLANs 12

RADIUS 105

REP 7

resetting the interface 45

RMON 3

SNMP 5

SPAN and RSPAN 6

system message logging 3

TACACS+ 18

VLAN mapping 9

Y.1731 29

default gateway

configuring 11

verifying configuration 11

default settings, erase commad 33

default web-based authentication configuration

802.1X 6

defining/modifying/deleting a capture point, Wireshark 12

denial-of-service attacks

IP address spoofing, mitigating 5

Unicast RPF, deploying 5

denying access to a server on another VLAN 25

deploying 10-Gigabit Ethernet and a Gigabit Ethernet SFP ports 12, 13

deploying 10-Gigabit Ethernet and a Gigabit Ethernet SFP ports on WS-X4606-10GE-E and Sup 6-E 13

description command 29

dev command 3

device discovery protocol 1

device IDs

call home format 21, 22

device sensor

configuring 120

DHCP

configuring

rate limit for incoming packets 13

denial-of-service attacks, preventing 13

rate limiting of packets

configuring 13

DHCP option 82

identifying a port with 4

overview 3

DHCP Snooping

enabling, and Option 82 10

DHCP snooping

accepting untrusted packets form edge switch 10

configuring 6

default configuration 7

displaying binding tables 19

displaying configuration 19

displaying information 18

enabling 7

enabling on private VLAN 12

enabling on the aggregation switch 9

enabling the database agent 13

message exchange process 4

monitoring 23

option 82 data insertion 3

overview 1

Snooping database agent 2

DHCP Snooping Database Agent

adding to the database (example) 18

enabling (example) 15

overview 2

reading from a TFTP file (example) 17

DHCP-based autoconfiguration

client request message exchange 3

configuring

client side 3

DNS 5

relay device 5

server-side 4

TFTP server 4

example 7

lease options

for IP address information 4

for receiving the configuration file 4

overview 2

relationship to BOOTP 3

Diagnostics

online 1

Power-On-Self-Test

causes of failure 19

how it works 10

overview 10

Power-On-Self-Test for Supervisor Engine V-10GE 12

Differentiated Services Code Point values

See DSCP values

DiffServ architecture, QoS 2

Digital optical monitoring transceiver support 23

dir device command 3

disabled state

RSTP comparisons (table) 24

disabling

broadcast storm control 5

disabling multicast storm control 6

disconnect command 7

discovery, clusters

See automatic discovery

discovery, Ethernet OAM 34

display dection and removal events 7

display filter, Wireshark 7

display PoE consumed by a module 8

display PoE detection and removal events 7

displaying

Auth Manager sumary for an interface 128

MAB details 130

summary of all Auth manager sessions 128

summary of all Auth manager sessions on the switch authorized for a specified authentication method 128

displaying EtherChannel to a Virtual Switch System 20

displaying storm control 6

displaying Wireshark information 14

dispute mechanism 40

DNS

and DHCP-based autoconfiguration 5

default configuration 23

displaying the configuration 24

overview 22

setting up 23

Domain Name System

See DNS

domain names

DNS 22

double-tagged packets

802.1Q tunneling 2

Layer 2 protocol tunneling 15

downloading MIBs 3, 4

drop threshold for Layer 2 protocol packets 16

DSCP values

definition 4

IP precedence 2

Dual_Active Detection

using Enhanced PAgP 23

Dual-Active Detection, using Fast-Hello 24

duplex command 27

duplex mode

configuring interface 24

dynamic ARP inspection

ARP cache poisoning 2

configuring

ACLs for non-DHCP environments 11

in DHCP environments 5

log buffer 14

rate limit for incoming ARP packets 16

denial-of-service attacks, preventing 16

interface trust state, security coverage 3

log buffer

configuring 14

logging of dropped packets 4

overview 1

port channels, their behavior 5

priority of static bindings 4

purpose of 2

rate limiting of ARP packets 4

configuring 16

validation checks, performing 19

Dynamic Host Configuration Protocol snooping

See DHCP snooping

dynamic port VLAN membership

example 28

limit on hosts 28

reconfirming 25, 26

troubleshooting 28

E

EAP frames

changing retransmission time 88

exchanging (figure) 4, 6, 13

request/identity 4

response/identity 4

setting retransmission number 89

EAPOL frames

802.1X authentication and 3

OTP authentication, example (figure) 4, 13

start 4

Echo mode,configuring BFD 15

edge ports

description 27

EGP

overview 17

EIGRP

configuration examples 20

monitoring and maintaining 19

EIGRP (Enhanced IGRP)

stub routing

benefits 18

configuration tasks 18

configuring 14

overview 14

restrictions 18

verifying 19

EIGRP (enhanced IGRP)

overview 18

eigrp stub command 19

EIGRP stub routing, configuring 13

ELIN location 3

e-mail addresses

assigning for call home 4

e-mail notifications

Call Home 24, 1

Embedded CiscoView

displaying information 48

installing and configuring 45

overview 45

emergency alarms on Sup Engine 6-E systems 5

enable command 9, 28

enable mode 5

enabling SNMP 4, 5

encryption keying 2

encryption keys, MKA 2

Enhanced Interior Gateway Routing Protocol

See EIGRP

enhanced object tracking

defined 1

IP routing state 2

line-protocol state 2

tracked lists 3

Enhanced PoE support on E-series 15

Enhanced PoE support on E-series,configuring Universal PoE 16

environmental monitoring

using CLI commands 1

EPM logging 131

errdisable recovery

configuring 14

ERSPAN

Overview 3

EtherChannel

channel-group group command 49, 9, 11

configuration guidelines 32, 6

configuring 7–20

configuring (tasks) 30

configuring Layer 2 11

configuring Layer 3 8

DFC restriction, see CSCdt27074 in the Release Notes

displaying to a virtual switch system 20

interface port-channel command 8

lacp system-priority

command example 16

modes 3

overview 2

PAgP

Understanding 4

physical interface configuration 49, 8

port-channel interfaces 2

port-channel load-balance command 19

removing 20

removing interfaces 19

understanding 1

EtherChannel guard

disabling 7

enabling 6

overview 6

Ethernet management port

and routing 6

and routing protocols 6

configuring 11

default setting 6

described 29, 6

for network management 29, 6

specifying 11

supported features 10

unsupported features 11

Ethernet management port, internal

and routing protocols 6

Ethernet Management Port, using 6

Ethernet OAM 34

and CFM interaction 51

configuration guidelines 35

configuring with CFM 51

default configuration 35

discovery 34

enabling 36, 52

link monitoring 34, 38

messages 34

protocol

defined 33

monitoring 49

remote failure indications 34

remote loopback 34, 37

templates 45

Ethernet OAM protocol CFM notifications 51

Ethernet Remote Defect Indication (ETH-RDI) 28

event triggers, user-defined

configuring, 802.1X-based 8

configuring, MAC address-based 9

explicit host tracking

enabling 11

extended range VLANs

See VLANs

Extensible Authentication Protocol over LAN 2

Exterior Gateway Protocol

See EGP

F

Fa0 port

See Ethernet management port

Failure detection, using BFD 7

Fallback Authentication

 

configure with 802.1X 80

fast link notification

on VSL failure 13

Fast UDLD

configuring probe message interval 8

default configuration 3

displaying link status 9

enabling globally 5

enabling on individual interface 7

enabling per-interface 6

modes of operation 3

resetting disabled LAN interfaces 8

use case 2

Fast UDLD, overview 1

FastDrop

overview 11

fastethernet0 port

See Ethernet management port

Fast-Hello

dual-active detection 24

Fast-Hello dual-active detection, configuring 53

feature interactions, Wireshark 10

FIB

description 2

See also MFIB

fiber-optics interfaces

disabling UDLD 7

Filter-ID ACL and Per-User ACL, configureport-based authentication

configure Per-User ACL and Filter-ID ACL 48

filtering

in a VLAN 19

non-IP traffic 14, 15

filters, Wireshark 6

flags 12

Flash memory

configuring router to boot from 31

loading system images from 30

security precautions 31

Flex Links

configuration guidelines 5

configuring 6

configuring preferred VLAN 9

configuring VLAN load balancing 8

monitoring 12

Flexible NetFlow

caveats 8

defined 4, 1

flooded traffic, blocking 2

flow control, configuring 29

flowchart, traffic marking procedure 21, 55

For 13

forward-delay time (STP)

configuring 19

forwarding information base

See FIB

frame command 5

G

gateway

See default gateway

get-bulk-request operation 3

get-next-request operation 3, 4

get-request operation 3, 4

get-response operation 3

Gigabit Ethernet SFP ports

deploy with 10-Gigabit Ethernet 12, 13

GLBP, introduction 15

global configuration mode 5

Guest-VLANs

configure with 802.1X 60

H

hardware and software ACL support 6

hardware switching 5

hello time (STP)

configuring 17

high CPU due to ACLs, troubleshooting 7

history

CLI 4

history table, level and number of syslog messages 9

hop counts

configuring MST bridges 28

host

limit on dynamic port 28

host modes, MACsec 3

host ports

kinds of 4

host presence CDP message 8

Hot Standby Routing Protocol

See HSRP

HSRP

description 15

HSRP, introduction 15

hw-module module num power command 22

I

i command 3

ICMP

enabling 12

ping 7

running IP traceroute 9

time exceeded messages 9

ICMP Echo operation

configuring 11

IP SLAs 11

IDS

using with SPAN and RSPAN 2

IEEE 802.1ag 2

IEEE 802.1s

See MST

IEEE 802.1w

See MST

IEEE 802.3ad

See LACP

IGMP

configurable-leave timer 4

description 3

enabling 15

explicit host tracking 4

immediate-leave processing 3

leave processing, enabling 8

overview 2

report suppression

disabling 10

IGMP filtering

configuring 31

default configuration 30

described 30

monitoring 34

IGMP groups

setting the maximum number 33

IGMP Immediate Leave

configuration guidelines 9

IGMP profile

applying 32

configuration mode 31

configuring 31

IGMP Snooping

configure

leave timer 9

configuring

Learning Methods 7

static connection to a multicast router 8

configuring host statically 11

enabling

Immediate-Leave processing

explicit host tracking 11

suppressing multicast flooding 12

IGMP snooping

configuration guidelines 5

default configuration 5, 6

enabling

globally 6

on a VLAN 6

enabling and disabling 6

IP multicast and 4

monitoring 14, 10

overview 2

IGMP Snooping, displaying

group 16

hot membership 15

how to 15

MAC address entries 18

multicast router interfaces 17

on a VLAN interface 18

Querier information 19

IGMPSnooping Querier, configuring 10

Immediate Leave, IGMP

enabling 8

immediate-leave processing

enabling 8

IGMP

See fast-leave processing

ingress packets, SPAN enhancement 12

inline power

configuring on Cisco IP phones 5

insufficient inline power handling for Supervisor Engine II-TS 22

Intelligent Power Management 4

interacting with Baby Giants 35

interface

displaying operational status 6

interface command 9, 2

interface configuration

REP 10

interface link and trunk status events

configuring 43

interface port-channel command 48, 8

interface range command 4

interface range macro command 11

interfaces

adding descriptive name 29

clearing counters 42

configuring 2

configuring ranges 4

displaying information about 41

Layer 2 modes 3

maintaining 41

monitoring 41

naming 29

numbers 2

overview 2

restarting 42, 43

See also Layer 2 interfaces

using the Ethernet Management Port 6

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Internet Protocol version 6

See IPv6

introduction

802.1X Identity-Based Network Security, list of supported features 34

Bidirectional Forwarding Detection 13

Cisco Call Home 24

Cisco Energy Wise 24

Cisco Express Forwarding 14

Cisco IOS IP Service Level Agreements 24

Cisco IOS Mediatrace and Performance Monitor 26

Cisco Media Services Proxy 25

Cisco Medianet AutoQoS 25

Cisco Medianet Flow Metadata 26

Cisco TrustSec MACsec Encryption 36

Cisco TrustSec Security Architecture 36

Debugging Features (platform and debug platform) 43

Device Sensor 14

Dynamic Host Control Protocol 28

Easy Virtual Network 28

EIGRP Stub routing 14

Embedded Event Manager 29

Enhanced Object Tracking 14

EtherChannel bundles 3

Ethernet CFM 3

Ethernet Management Port 29

Ethernet OAM Protocol 3

FAT File Management System (Sup 60-E, 6L-E, 4948E, and 4900M) 30

File System Management (Sup 7-E and 7L-E) 29

Flex Link and MAC Address-Table Move Update 3

Flexible Netflow (Sup 7-E and 7L-E) 4

GLBP 15

hard-based Control Plane Policing 37

HSRP 15

In Service Software Upgrade 19

Intelligent Power Management 30

Internet Group Management Protocol (IGMP) Snooping 4

IP Routing protocols 17

IP Source Guard 38

IP Source Guard or Static Hosts 38

IPv6 19

IPv6 First Hop Security 38

IPv6 Multicast BSR and BSR Scoped Zone Support, introduction 5

IPv6 Multicast Listen Discovery (MLD) and Multicast Listen Discovery Snooping 6

IS-IS 18

Jumbo Frame 6

Layer 2 traceroute 43

Link Aggregation Control Protocol 7

MAC Address Notification 30

NAC

Layer 2 802.1X authentication 40

Layer 2 IP validation 40

NetFlow-lite 31

Network Security with ACLs (IP ACLs, MAC ACLs, Port ACLs, Router, ACLs, and VLAN ACLs) 41

NSF with SSO 21

OSPF 18

OSPF for Routed Access 21

Port Security 41

Power over Ethernet 31

RIP 19

Simple Network Management Protocol 31

SPAN and RSPAN 32

Time Domain Reflectometry 43

Unicast Reverse Path Forwarding 22

Universal Power over Ethernet 32

Virtual Router Redundancy Protocol 23

VRF-lite 22

Web Content Coordination Protocol 32

Web-based Authentication 43

Wireshark 33

XML-PI 33

Intrusion Detection System

See IDS

inventory management TLV 3, 9

IOS shell

See Auto SmartPorts macros

IP

configuring default gateway 11

configuring static routes 11

displaying statistics 8

IP addresses

128-bit 2

cluster candidate or member 12

cluster command switch 11

discovering 44

IPv6 2

ip cef command 7, 2

IP Enhanced IGRP

interfaces, displaying 20

ip icmp rate-limit unreachable command 12

ip igmp profile command 31

ip igmp snooping tcn flood command 13

ip igmp snooping tcn flood query count command 14

ip igmp snooping tcn query solicit command 14

IP information

assigned

through DHCP-based autoconfiguration 2

ip load-sharing per-destination command 8

ip local policy route-map command 12

ip mask-reply command 13

IP MTU sizes,configuring 9

IP multicast

clearing table entries 28

configuring 13

default configuration 14

displaying PIM information 24

displaying the routing table information 24

enabling dense-mode PIM 15

enabling sparse-mode 15

features not supported 13

hardware forwarding 9

IGMP snooping and 5, 4

overview 1

routing protocols 2

software forwarding 9

See also Auto-RP; IGMP; PIM; RP; RPF

IP multicast routing

enabling 14

monitoring and maintaining 23

IP multicast traffic, load splitting 22

ip multicast-routing command 14

IP phones

configuring voice ports 3

See Cisco IP Phones 1

ip pim command 15

ip pim dense-mode command 15

ip pim sparse-dense-mode command 16, 17

ip policy route-map command 9, 11, 14

IP Port Security for Static Hosts

on a Layer 2 access port 25

on a PVLAN host port 28

overview 24

ip redirects command 13

IP routing tables

deleting entries 28

IP Service Level Agreements

See IP SLAs

IP service levels, analyzing 1

IP SLAs

benefits 2

CFM endpoint discovery 21

configuration guidelines 6

Control Protocol 4

default configuration 6

definition 1

ICMP echo operation 11

manually configuring CFM ping or jitter 19

measuring network performance 3

multioperations scheduling 5

operation 3

reachability tracking 9

responder

described 4

enabling 7

response time 4

scheduling 5

SNMP support 2

supported metrics 2

threshold monitoring 6

track state 9

UDP jitter operation 8

IP Source Guard

configuring 20

configuring on private VLANs 22

displaying 22, 23

overview 23

IP statistics

displaying 8

IP traceroute

executing 9

overview 8

IP unicast

displaying statistics 8

IP Unnumbered support

configuring on a range of Ethernet VLANs 5

configuring on LAN and VLAN interfaces 4

configuring with connected host polling 6

DHCP Option 82 2

displaying settings 7

format of agent remote ID suboptions 2

troubleshooting 8

with conected host polling 3

with DHCP server and Relay agent 2

ip unreachables command 12

IPsec VPN, introduction 40

IPv4, IPv6, and MAC ACLs, configuring on a Layer 2 interface 31

IPv6

addresses 2

default configuration 7

defined 19, 1

Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 6

Router ID 6

OSPF 6

IPv6 control traffic, policing 20

IPv6 First Hop Security, introduction 38

IPX

redistribution of route information with EIGRP 18

is 23

IS-IS, introduction 18

ISL

trunking with 802.1Q tunneling 4

isolated port 4

isolated VLANs 2, 3, 4

ISSU

compatibility matrix 63, 14

compatiblity verification using Cisco Feature Navigator 64, 15

NSF overview 3, 4

perform the process

aborting a software upgrade 79, 34

configuring the rollback timer as a safeguard 81, 35, 36

displaying a compatibility matrix 82, 36, 40, 37

loading the new software on the new standby 72, 27

stopping the rollback timer 72, 26

switching to the standby 70, 24

verify the ISSU state 67, 20, 21

verify the redundancy mode 65, 19

verify the software installation 65, 18, 19

vload the new software on standby 68, 21

prerequisites 58, 1, 2

process overview 6, 7

restrictions 58, 1, 2

SNMP support 15

SSO overview 3, 4

versioning capability in software to support 13

IST

and MST regions 22

description 22

master 27

ITU-T Y.1731

See Y.1731

J

jumbo frames

and ethernet ports 33

configuring MTU sizes for 34

ports and linecards that support 31

understanding MTUs 32

understanding support 32

VLAN interfaces 33

K

keyboard shortcuts 3

L

l2protocol-tunnel command 17, 19

labels, definition 3

LACP

system ID 5

Layer 2 access ports 7

Layer 2 Control Packet QoS

and CoPP configuration example 18

default configuation 15

disabling 17

enabvling 15

guideline and restrictions 20

understanding 15

Layer 2 frames

classification with CoS 2

Layer 2 interface

applying ACLs 33

configuring access-mode mode on 33

configuring IPv4, IPv6, and MAC ACLs 31

displaying an ACL configuration 34

Layer 2 interface type

resetting 24

setting 24

Layer 2 interfaces

assigning VLANs 7

configuring 5

configuring as PVLAN host ports 18

configuring as PVLAN promiscuous ports 17

configuring as PVLAN trunk ports 19

defaults 4

disabling configuration 8

modes 3

show interfaces command 6

Layer 2 protocol tunneling

default configuration 16

guidelines 16

Layer 2 switching

overview 1

Layer 2 Traceroute

and ARP 10

and CDP 10

host-to-host paths 10

IP addresses and subnets 10

MAC addresses and VLANs 10

multicast traffic 10

multiple devices on a port 10

unicast traffic 43, 9

usage guidelines 10

Layer 2 trunks

configuring 5

overview 3

Layer 3 interface counters,configuring 11

Layer 3 interface counters,understanding 3

Layer 3 interface, applying IPv6 ACLs 18

Layer 3 interfaces

changing from Layer 2 mode 16

configuration guidelines 5

configuring VLANs as interfaces 8

overview 1

counters 3

logical 2

physical 2

SVI autostate exclude 3

Layer 3 packets

classification methods 2

Layer 4 port operations

configuration guidelines 11

restrictions 11

Leave timer, enabling 9

licenses, managing with PRTU 14

limitations on using a TwinGig Convertor 14

Link Aggregation Control Protocol, introduction 7

link and trunk status events

configuring interface 43

link integrity, verifying with REP 4

Link Layer Discovery Protocol

See CDP

link monitoring, Ethernet OAM 34, 38

link status, displaying UDLD 9

link-state tracking

configuration guidelines 26

default configuration 26

described 23

displaying status 27

generic configuration procedure 26

listening state (STP)

RSTP comparisons (table) 24

LLDP

configuring 4

characteristics 5

default configuration 5

disabling and enabling

globally 6

on an interface 7

monitoring and maintaining 14

overview 1

transmission timer and holdtime, setting 5

LLDP Media Endpoint Discovery

See LLDP-MED

LLDP-MED

configuring

procedures 4

TLVs 9, 11

monitoring and maintaining 14

overview 1

supported TLVs 2

load balancing

configuring for CEF 7

configuring for EtherChannel 18

overview 6

per-destination 7

load splitting IP multicast traffic 22

Location Service

overview 1

location service

configuring 12

understanding 3

location TLV 3, 9

logging, EPM 131

Logical Layer 3 interfaces

configuring 6

logical layer 3 VLAN interfaces 2

login authentication

with RADIUS 108

with TACACS+ 19

login banners 24

login timer

changing 6

logoutwarning command 6

loop guard

and MST 23

configuring 5

overview 3

M

MAC address learning, disabling on a VLAN 39

confuguring 39

deployment scenarios 40

feature compatibility 42

feature incompatibility 43

feature inompatibility 43

usage guidelines 40

MAC address table

displaying 44

MAC addresses

aging time 30

allocating 6

and VLAN association 29

building tables 28, 2

convert dynamic to sticky secure 5

default configuration 30

disabling learning on a VLAN 39

discovering 44

displaying 3

displaying in DHCP snooping binding table 19

dynamic

learning 29

removing 31

in ACLs 14

static

adding 37

allowing 38

characteristics of 36

dropping 38

removing 37

sticky 4

sticky secure, adding 5

MAC address-table move update

configuration guidelines 9

configuring 10

monitoring 12

MAC Authentication Bypass

configure with 802.1X 63

MAC details, displaying 130

MAC extended access lists 14

MAC/PHY configuration status TLV 2

macl 15

macros

See Auto SmartPorts macros

See Auto Smartports macros

See Smartports macros

MACSec

802.1AE Tagging 9

MACsec 2

configuring on an interface 7

defined 1, 2

switch-to-switch security 1

MACsec Key Agreement Protocol

See MKA

main-cpu command 8, 7

management address TLV 2

management options

SNMP 1

Management Port, Ethernet 6

managing software licenses, using PRTU 14

manual preemption, REP, configuring 13

marking

hardware capabilities 23, 57

marking action drivers 21, 55

marking network traffic 18, 52

marking support, multi-attribute 22, 56

match ip address command 8, 10, 12, 13

maximum aging time (STP)

configuring 18

MDA

configuration guidelines 23–??

described 23

MEC

configuration 48

described 13

failure 14

Media Access Control Security

See MACsec

member switch

managing 13

member switch, cluster

defined 2

members

automatic discovery 7

meminfo command 6

messages, Ethernet OAM 34

messages, to users through banners 24

Metro features

Y.1731 (AIS and RDI), introduction 12

metro tags 2

MFIB

CEF 6

overview 12

MFIB, IP

displaying 26

MIBs

compiling 4

downloading 3, 4

overview 1

related information 3

SNMP interaction with 4

MKA

configuring policies 6

defined 2

policies 2

replay protection 3

statistics 4

virtual ports 3

MLD Done messages and Immediate-leave 4

MLD messages 2

MLD queries 3

MLD reports 4

MLD Snooping

MLD Done messages and Immediate-leave 4

MLD messages 2

MLD queries 3

MLD reports 4

Multicast client aging robustness 3

Multicast router discovery 3

overview 1

Mode of capturing control packets, selecting 7

modules

checking status 1

powering down 22

monitoring

802.1Q tunneling 23

ACL information 37

Ethernet CFM 32, 33

Ethernet OAM 49

Ethernet OAM protocol 49

Flex Links 12

IGMP

snooping 10

IGMP filters 34

IGMP snooping 14

Layer 2 protocol tunneling 23

MAC address-table move update 12

multicast router interfaces 11

multi-VRF CE 14, 21, 22

MVR 29

object tracking 12

REP 14

traffic flowing among switches 1

tunneling 23

VLAN filters 26

VLAN maps 26

monitoring and troubleshooting

BFD 17

M-record 23

MST

and multiple spanning trees 8, 22

boundary ports 27

BPDUs 23

configuration parameters 26

configuring 28

displaying configurations 32

edge ports 27

enabling 29

hop count 28

instances

configuring parameters 31

description 23

number supported 26

interoperability with PVST+ 23

link type 28

master 27

message age 28

regions 26

restrictions 28

to-SST interoperability 24

MSTP

EtherChannel guard

enabling 6

M-record 23

M-tree 23

MST-to-PVST+ Interoperability (PVST+ simulation) 35

MST-to-PVST+ Interoperability guidelines 35

M-tree 23

MTU size

configuring 34, 35, 44

default 4

MTUS

understanding 32

Multi-authentication

described 23

multiauthentication mode 8

multicast

See IP multicast

Multicast client aging robustness 3

multicast Ethernet loopback (ETH-LB) 29

multicast Ethernet loopback, using 31

Multicast Forwarding Information Base (MFIB) 12

multicast groups

static joins 7

Multicast HA 13

Multicast implementation

HA 13

MFIB 12

S/M, 224/4 13

multicast packets

blocking 2

Multicast router discovery 3

multicast router interfaces, displaying 17

multicast router interfaces, monitoring 11

multicast router ports, adding 7

multicast router table

displaying 24

multicast routers

flood suppression 12

Multicast Storm Control

 

enabling 4

disabling 6

multicast television application, using MVR 21

Multicast VLAN Registration

See MVR

multichassis EtherChannel

see MEC 13

multidomain authentication

See MDA

multidomain authentication mode 7

multioperations scheduling, IP SLAs 5

Multiple AuthorizationAuthentication

configuring 36

Multiple Domain Authentication 36

multiple forwarding paths 8, 22

Multiple Spanning Tree

See MST

multiple VPN routing/forwarding

See multi-VRF CE

multiple-hosts mode 7

multi-VRF CE

components 3

configuration example 17

defined 1

displaying 14, 21, 22

monitoring 14, 21, 22

network components 3

packet-forwarding process 3

MVR

configuration guidelines and limitations 23

configuring global parameters 24

configuring on a trunk port 27

configuring on access ports 26

default configuration 23

displaying information 29

in a multicast television application 21

monitoring 29

setting global parameters 24

N

NAC Layer 2 802.1X authentication, intro 40

NAC Layer 2 IP validation, intro 40

named IPv6 ACLs, configuring

ACLs

configuring named IPv6 ACLs 16

named MAC extended ACLs

ACLs

configuring named MAC extended 14, 15

native VLAN

and 802.1Q tunneling 3

specifying 6

NDAC 9

defined 9

MACsec 1

NEAT

configuring 90

overview 25

neighbor offset numbers, REP 5

NetFlow packet sampling

about 2

NetFlow-lite

clear commands 9

display commands 8

Network Assistant

and VTY 12

configure

enable communication with switch 13, 17

default configuration 3

overview of CLI commands 3

Network Device Admission Control (NDAC) 9

Network Edge Access Topology

See NEAT

network fault tolerance 8, 22

network management

configuring 1

RMON 1

SNMP 1

network performance, measuring with IP SLAs 3

network policy TLV 2, 9

Network Time Protocol

See NTP

network traffic, marking 18, 52

New Software Features in Release 7.7

TDR 3

Next Hop Resolution Protocol

See NHRP

NHRP

support 18

non-fiber-optics interfaces

disabling UDLD 7

non-IP traffic filtering 14, 15

non-RPF traffic

description 10

in redundant configurations (figure) 11

Nonstop Forwarding

See NSF

nonvolatile random-access memory

See NVRAM

normal-range VLANs

See VLANs

NSF

defined 1

guidelines and restrictions 9

operation 4

NSF with SSO supervisor engine redundancy

and CEF 5

overview 3

SSO operation 4

NSF-aware

supervisor engines 3

support 2

NSF-capable

supervisor engines 3

support 2

NTP

associations

authenticating 4

defined 2

enabling broadcast messages 7

peer 6

server 6

default configuration 4

displaying the configuration 11

overview 2

restricting access

creating an access group 9

disabling NTP services per interface 10

source IP address, configuring 10

stratum 2

synchronizing devices 6

time

services 2

synchronizing 2

ntroduction

PPPoE Intermediate Agent 41

Storm Control 42

uRPF Strict Mode 42

NVRAM

saving settings 10

O

OAM

client 34

features 34

sublayer 34

OAM manager

configuring 52

with CFM and Ethernet OAM 51

OAM PDUs 35

OAM protocol data units 33

OBFL, displaying for the 9000W AC 4

object tracking

monitoring 12

OGACLs 3

OIR

overview 38

on-demaind online diagnostics 1

online diagnostic

troubleshooting 8

Online Diagnostics 1

online diagnostics

configuring on-demaind 1

data path, displaying test results 6

displaying tests and test results 4

linecard 8

scheduling 2

starting and stopping tests 3

online insertion and removal

See OIR

Open Shortest Path First

See OSPF

operating system images

See system images

Option 82

enabling DHCP Snooping 10

OSPF

area concept 19

description 18

for IPv6 6

OSPF for Routed Access, introduction 21

OSPF, introduction 18

P

packet type filtering

overview 14

SPAN enhancement 14

packets

modifying 9

PACL

using with access-group mode 32

PACL configuration guidelines 30

PACL with VLAN maps and router ACLs 34

PAgP

understanding 4

PAgP, dual-active detection 23

passwords

configuring enable password 14

configuring enable secret password 14

encrypting 22

in clusters 8

recovering lost enable password 25

setting line password 14

PBR (policy-based routing)

configuration (example) 16

enabling 7, 10

features 2

overview 1

route maps 2

route-map processing logic 3

when to use 6

PE to CE routing, configuring 9

percentage thresholds in tracked lists 6

Permanent Right-To_Use 14

per-port and VLAN Access Control List 19

per-port per-VLAN QoS

enabling 36, 70

overview 10

Per-User ACL and Filter-ID ACL, configure 48

Per-VLAN Rapid Spanning Tree 6

enabling 20

overview 6

physical layer 3 interfaces 2

Physical Layer 3 interfaces, configuring 12

PIM

configuring dense mode 15

configuring sparse mode 15

displaying information 24

displaying statistics 28

enabling sparse-dense mode 15, 16

overview 3

PIM on an interface, enabling 15

PIM-DM 3

PIM-SM 3

PIM-SSM mapping, enabling 17

ping

executing 8

overview 7

ping command 8, 24

PoE 7, 8

configuring power consumption for single device 5, 16

configuring power consumption, powered devices 5

displaying operational status for an interface 6

Enhanced PoE support on E-series 15

policing and monitoring 12

power consumption for powered devices

Intelligent Power Management 4

power management modes 2

powering down a module 22

PoE policing

configuring errdisable recovery 14

configuring on an interface 13

displaying on an interface 14

power modes 12

point-to-point

in 802.1X authentication (figure) 3

policing

how to implement 18, 52

See QoS policing

policing IPv6 control traffic 20

policing, PoE 12

policy associations, QoS on Sup 6-E 39, 73

policy map marking action, configuring 23, 57

policy-map command 16, 51

port ACLs

and voice VLAN 5

defined 3

Port Aggregation Protocol

see PAgP

port cost (STP)

configuring 15

port description TLV 2

port numbering with TwinGig Convertors 13

port priority

configuring MST instances 31

configuring STP 13

port security

aging 5

configuring 7

displaying 28

guidelines and restrictions 33

on access ports 7, 22

on private VLAN 14

host 14

promiscuous 16

topology 15, 18, 32

on trunk port 17

guidelines and restrictions 15, 18, 32

port mode changes 22

on voice ports 22

sticky learning 5

using with 802.1X 19

violations 6

with 802.1X Authentication 32

with DHCP and IP Source Guard 31

with other features 33

port states

description 5

port VLAN ID TLV 2

port-based authentication

802.1X with voice VLAN 22

Authentication Failed VLAN assignment 17

authentication server

defined 2

changing the quiet period 87

client, defined 3, 2

configuration guidelines 30, 6

configure ACL assignments and redirect URLs 40

configure switch-to-RADIUS server communication 34

configure with Authentication Failed 73

configure with Critical Authentication 65

configure with Guest-VLANs 60

configure with MAC Authentication Bypass 63

configure with VLAN User Distribution 71

configure with Voice VLAN 75

configuring

Multiple Domain Authentication and Multiple Authorization 36

RADIUS server 10

RADIUS server parameters on the switch 9

configuring Fallback Authentication 80

configuring Guest-VLAN 34

configuring manual re-authentication of a client 97

configuring with Unidirectional Controlled Port 69

controlling authorization state 5

default configuration 29, 6

described 1

device roles 2

displaying statistics 127, 14

enabling 30

802.1X authentication 9

enabling multiple hosts 85

enabling periodic re-authentication 84

encapsulation 3

host mode 6

how 802.1X fails on a port 27

initiation and message exchange 4

method lists 30

modes 6

multidomain authentication 23

multiple-hosts mode, described 7

port security

multiple-hosts mode 7

ports not supported 5

pre-authentication open access 8

resetting to default values 97

setting retransmission number 89

setting retransmission time 88

switch

as proxy 2

switch supplicant

configuring 90

overview 25

topologies, supported 27

using with ACL assignments and redirect URLs 20

using with port security 19

voice aware 802.1x security

configuring 77

described 22, 76

with Critical Authentication 14

with Guest VLANs 11

with MAC Authentication Bypass 12

with Unidirectional Controlled Port 15

with VLAN assignment 10

with VLAN User Distribution 16

port-channel

see EtherChannel

port-channel interfaces

See also EtherChannel

creating 48, 8

overview 2

port-channel load-balance

command 14, 16

command example 16

port-channel load-balance command 19

PortFast

and MST 23

configuring or enabling 23

overview 7

PortFast BPDU filtering

and MST 23

overview 16

PortFast Edge BPDU Filtering 17

ports

blocking 1

checking status 2

dynamic VLAN membership

example 28

reconfirming 25, 26

forwarding, resuming 3

REP 6

See also interfaces

power

inline 5

power dc input command 21

power handling for Supervisor Engine II-TS 12

power inline command 3

power inline consumption command 5

power management

Catalyst 4500 series 7

Catalyst 4500 Switch power supplies 14

Catalyst 4948 series 23

configuring combined mode 13

configuring redundant mode 12

overview 1

redundancy 7

power management for Catalyst 4500 Switch

combined mode 9

redundant mode 9

power management limitations in Catalyst 4500 Switch 10

power management mode

selecting 10

power management TLV 2, 3, 9

power negotiation

through LLDP 11

power policing, displaying on an interface 14

power redundancy-mode command 13

power supplies

available power for Catalyst 4500 Switch 14

fixed 8

variable 8, 23

powered devices, configuring power consumption 5

Power-On-Self-Test diagnostics 10, 19

Power-On-Self-Test for Supervisor Engine V-10GE 12

pre-authentication open access 8

pre-authentication open access. See port-based authentication.

preempt delay time, REP 5

primary edge port, REP 4

primary VLANs 2, 4

associating with secondary VLANs 16

configuring as a PVLAN 15

priority

overriding CoS of incoming frames 4

priority queuing, QoS on Sup 6-E 30, 64

private VLAN

configure port security 14, 15

enabling DHCP Snooping 12

private VLANs

across multiple switches 5

and SVIs 10

benefits of 2

community ports 3

community VLANs 2, 3

default configuration 12

end station access to 3

isolated port 4

isolated VLANs 2, 3, 4

ports

community 3

isolated 4

promiscuous 4

primary VLANs 2, 4

promiscuous ports 4

secondary VLANs 2

subdomains 2

traffic in 9

privileged EXEC mode 5

privileges

changing default 23

configuring levels 23

exiting 24

logging in 24

promiscuous ports

configuring PVLAN 17

defined 4

setting mode 24

protocol timers 4

provider edge devices 2

PRTU, managing software licenses 14

pruning, VTP

See VTP pruning

pseudobridges

description 25

PVACL 19

PVID (port VLAN ID)

and 802.1X with voice VLAN ports 22

PVLAN promiscuous trunk port

configuring 11, 17, 21

PVLANs

802.1q support 14

across multiple switches 5

configuration guidelines 12

configure port security 14, 16, 18

configure port security in a wireless setting 32

configuring 11

configuring a VLAN 15

configuring promiscuous ports 17

host ports

configuring a Layer 2 interface 18

setting 24

overview 1

permitting routing, example 23

promiscuous mode

setting 24

setting

interface mode 24

PVST+ simulation 36

Q

QoS

classification 6–??

definitions 3

enabling per-port per-VLAN 36, 70

overview 1

overview of per-port per-VLAN 10

packet modification 9

traffic shaping 9

See also COS; DSCP values; transmit queues

QoS active queue management

tracking queue length 9

QoS labels

definition 3

QoS marking

description 5

QoS on Sup 6-E

Active Queue management via DBL 34, 68

active queue management via DBL 27, 34, 61, 68

classification 16, 50

configuring 13, 47

configuring CoS mutation 45, 79

configuring the policy map marking action 23, 57

hardware capabilities for marking 23, 57

how to implement policing 18, 52

marking action drivers 21, 55

marking network traffic 18, 52

MQC-based QoS configuration 13, 48

multi-attribute marking support 22, 56

platform hardware capabilities 15, 49

platform restrictions 18, 52

platform-supported classification criteria and QoS features 13, 14, 48

policing 17, 51

policy associations 39, 73

prerequisites for applying a service policy 15, 49

priority queuing 30, 64

queue-limiting 31, 65

restrictions for applying a service policy 15, 50

shaping 25, 59

sharing(bandwidth) 27, 61

sharing(blandwidth), shapring, and priority queuing 25, 59

software QoS 40, 74

traffic marking procedure flowchart 21, 55

QoS policing

definition 5

described 8

QoS policy

attaching to interfaces 8

QoS service policy

prerequisites 15, 49

restrictions for applying 15, 50

QoS transmit queues

burst 9

maximum rate 9

sharing link bandwidth 9

quad-supervisor

uplink forwarding 6

Quality of service

See QoS

queueing 8

queue-limiting, QoS on Sup 6-E 31, 65

R

RA Guard

configuring 38

deployment 38

examples 39

introduction 37

usage guidelines 40

RADIUS

attributes

vendor-proprietary 116

vendor-specific 114

change of authorization 100

configuring

accounting 113

authentication 108

authorization 112

communication, global 106, 114

communication, per-server 105, 106

multiple UDP ports 106

default configuration 105

defining AAA server groups 110

displaying the configuration 118

identifying the server 105

limiting the services to the user 112

method list, defined 105

operation of 99

server load balancing 118

suggested network environments 98

tracking services accessed by user 113

understanding 98

RADIUS Change of Authorization 100

RADIUS server

configure to-Switch communication 34

configuring settings 36

parameters on the switch 34

RADIUS, controlling switch access with 98

range command 4

range macros

defining 11

ranges of interfaces

configuring 4

Rapid Spanning Tree

See RSTP

rcommand command 13

reachability, tracking IP SLAs IP host 9

re-authentication of a client

configuring manual 97

enabling periodic 84

redirect URLs, port-based authentication 20

reduced MAC address 2

redundancy

configuring 7

guidelines and restrictions 5

changes made through SNMP 11

NSF-aware support 2

NSF-capable support 2

overview 2

redundancy command 8, 7

understanding synchronization 4, 5

redundancy (NSF) 1

configuring

BGP 11

CEF 11

EIGRP 16

IS-IS 14

OSPF 13

routing protocols 5

redundancy (RPR)

route processor redundancy 2, 3

synchronization 4, 5

redundancy (SSO)

redundancy command 10

route processor redundancy 3

synchronization 5

reload command 28, 29

Remote Authentication Dial-In User Service

See RADIUS

remote failure indications 34

remote loopback, Ethernet OAM 34, 37

Remote Network Monitoring

See RMON

rendezvous point, configuring 17

rendezvous point, configuring single static 21

REP

administrative VLAN 8

administrative VLAN, configuring 9

and STP 6

configuration guidelines 7

configuring interfaces 10

convergence 4

default configuration 7

manual preemption, configuring 13

monitoring 14

neighbor offset numbers 5

open segment 2

ports 6

preempt delay time 5

primary edge port 4

ring segment 2

secondary edge port 4

segments 1

characteristics 2

SNMP traps, configuring 14

supported interfaces 1

triggering VLAN load balancing 6

verifying link integrity 4

VLAN blocking 13

VLAN load balancing 4

replication

description 9

report suppression, IGMP

disabling 10

reserved-range VLANs

See VLANs

reset command 3

resetting a switch to defaults 33

resetting an interface to default configuration 45

Resilient Ethernet ProtocolLSee REP

responder, IP SLAs

described 4

enabling 7

response time, measuring with IP SLAs 4

restricting access

NTP services 8

RADIUS 98

TACACS+ 15

retransmission number

setting in 802.1X authentication 89

retransmission time

changing in 802.1X authentication 88

RFC

1157, SNMPv1 2

1305, NTP 2

1757, RMON 2

1901, SNMPv2C 2

1902 to 1907, SNMPv2 2

2273-2275, SNMPv3 2

RFC 5176 Compliance 100

RIP

description 19

for IPv6 6

RIP, introduction 19

RMON

default configuration 3

displaying status 6

enabling alarms and events 3

groups supported 2

overview 1

ROM monitor

boot process and 26

CLI 7

commands 2–3

debug commands 5–6

entering 1

exiting 6

overview 1

root bridge

configuring 9

selecting in MST 22

root guard

and MST 23

enabling 2

overview 2

route maps

defining 8, 10, 12

PBR 2

route targets

VPN 3

routed packets

ACLs 28

route-map (IP) command 8, 10, 12

router ACLs

description 41, 3

using with VLAN maps 27

router ACLs, using PACL with VLAN maps 34

Routing Information Protocol

See RIP

RPF

See Unicast RPF

RSPAN

configuration guidelines 16

destination ports 5

IDS 2

monitored ports 4

monitoring ports 5

received traffic 3

sessions

creating 17

defined 3

limiting source traffic to specific VLANs 23

monitoring VLANs 21

removing source (monitored) ports 20

specifying monitored ports 17

source ports 4

transmitted traffic 4

VLAN-based 5

RSTP

compatibility 23

description 22

port roles 24

port states 24

S

S/M, 224/4 13

SAID

See 802.10 SAID

SAP

defined 9

negotiation 9

support 1

scheduling 8

scheduling, IP SLAs operations 5

secondary edge port, REP 4

secondary root switch 12

secondary VLANs 2

associating with primary 16

permitting routing 23

security

configuring 1

Security Association Identifier

See 802.10 SAID

Security Exchange Protocol

See SAP

selecting a power management mode 10

selecting X2/TwinGig Convertor Mode 14

sequence numbers in log messages 7

server IDs

description 23

service policy, configure class-level queue-limit 31, 65

service-policy input command 2

service-provider networks

and customer VLANs 2

session keys, MKA 2

set default interface command 9, 11

set interface command 8, 10

set ip default next-hop command 9, 11

set ip next-hop command 8, 10, 16

set-request operation 4

severity levels, defining in system messages 8

shaping, QoS on Sup 6-E 25, 59

sharing(bandwidth), QoS on Sup 6-E 27, 61

Shell functions

See Auto SmartPorts macros

See Auto Smartports macros

Shell triggers

See Auto SmartPorts macros

See Auto Smartports macros

show adjacency command 10

show boot command 32

show catalyst4000 chassis-mac-address command 3

show cdp command 2, 3

show cdp entry command 4

show cdp interface command 3

show cdp neighbors command 4

show cdp traffic command 4

show ciscoview package command 48

show ciscoview version command 48

show cluster members command 13

show configuration command 29

show debugging command 4

show environment command 2

show history command 4

show interfaces command 34, 35, 42, 44

show interfaces status command 2

show ip cef command 8

show ip eigrp interfaces command 20

show ip eigrp neighbors command 20

show ip eigrp topology command 20

show ip eigrp traffic command 20

show ip interface command 24

show ip local policy command 12

show ip mroute command 24

show ip pim interface command 24

show l2protocol command 18

show lldp traffic command 15

show mac-address-table address command 3

show mac-address-table interface command 3

show mls entry command 8

show module command 1, 6

show PoE consumed 8

show power inline command 6

show power supplies command 13

show protocols command 42

show running-config command

adding description for an interface 29

checking your settings 9

displaying ACLs 21, 23, 32, 33

show startup-config command 10

show users command 6

show version command 29

shutdown threshold for Layer 2 protocol packets 16

shutdown, command 43

shutting down

interfaces 42

Simple Network Management Protocol

See SNMP

single spanning tree

See SST

single static RP, configuring 21

single-host mode 7

slot numbers, description 2

Slow timer, configuring BFD 16

smart call home 1

description 2

destination profile (note) 5

registration requirements 3

service contract requirements 3

Transport Gateway (TG) aggregation point 2

SMARTnet

smart call home registration 3

Smartports macros

applying global parameter values 8, 14

applying macros 8

applying parameter values 8

configuration guidelines 6, 13

configuring 2

creating 7

default configuration 3, 13

defined 10, 1

displaying 12

tracing 6, 13

SNMP

accessing MIB variables with 4

agent

described 4

disabling 7

and IP SLAs 2

authentication level 10

community strings

configuring 7

overview 4

configuration examples 15

configuration guidelines 6

default configuration 5

enabling 4, 5

engine ID 6

groups 6, 9

host 6

informs

and trap keyword 11

described 5

differences from traps 5

enabling 14

limiting access by TFTP servers 15

limiting system log messages to NMS 9

manager functions 3

notifications 5

overview 1, 4

status, displaying 16

system contact and location 14

trap manager, configuring 13

traps

described 3, 5

differences from informs 5

enabling 11

enabling MAC address notification 31

enabling MAC move notification 33

enabling MAC threshold notification 35

overview 1, 4

types of 11

users 6, 9

versions supported 2

SNMP commands 4

SNMP traps

REP 14

SNMPv1 2

SNMPv2C 2

SNMPv3 2

software

upgrading 13, 12

software configuration register 26

software QoS, on Sup 6-E 40, 74

software switching

description 5

interfaces 6

key data structures used 8

source group tag 4, 10

source IDs

call home event format 22

SPAN

and ACLs 5

configuration guidelines 7

configuring 7–10

destination ports 5

IDS 2

monitored port, defined 4

monitoring port, defined 5

received traffic 3

sessions

defined 3

source ports 4

transmitted traffic 4

VLAN-based 5

SPAN and RSPAN

concepts and terminology 3

default configuration 6

displaying status 24

overview 1

session limits 6

SPAN enhancements

access list filtering 13

configuration example 15

CPU port sniffing 10

encapsulation configuration 12

ingress packets 12

packet type filtering 14

spanning-tree backbonefast command 24

spanning-tree cost command 15

spanning-tree guard root command 2

spanning-tree port-priority command 13

spanning-tree uplinkfast command 20

spanning-tree vlan

command 9

command example 9

spanning-tree vlan command 8

spanning-tree vlan cost command 16

spanning-tree vlan forward-time command 19

spanning-tree vlan hello-time command 18

spanning-tree vlan max-age command 18

spanning-tree vlan port-priority command 13

spanning-tree vlan priority command 17

spanning-tree vlan root primary command 10

spanning-tree vlan root secondary command 12

speed

configuring interface 24

speed command 25, 26, 27

SSO

configuring 10

SSO operation 4

SST

description 22

interoperability 24

static ACL, removing the requirement 30

static addresses

See addresses

static routes

configuring 11

verifying 12

statistics

802.1X 14

displaying 802.1X 127

displaying PIM 28

LLDP 14

LLDP-MED 14

MKA 4

SNMP input and output 16

sticky learning

configuration file 6

defined 5

disabling 6

enabling 5

saving addresses 6

sticky MAC addresses

configuring 7

defined 4

storing captured packets to a.pcap file, Wireshark 8

Storm Control

displaying 6

enabling Broadcast 3

enabling Multicast 4

hardware-based, implementing 2

overview 1

software-based, implementing 2

STP

and REP 6

bridge ID 2

configuring 7–20

creating topology 5

defaults 7

disabling 20

enabling 8

enabling extended system ID 9

enabling Per-VLAN Rapid Spanning Tree 20

EtherChannel guard

disabling 7

forward-delay time 19

hello time 17

Layer 2 protocol tunneling 13

maximum aging time 18

overview 1, 3

per-VLAN rapid spanning tree 6

port cost 15

port priority 13

root bridge 9

stratum, NTP 2

stub routing (EIGRP)

benefits 18

configuration tasks 18

configuring 14

overview 13, 14

restrictions 18

verifying 19

subdomains, private VLAN 2

summer time 13

supervisor engine

accessing the redundant 14

configuring 8–13

copying files to standby 14

default configuration 1

default gateways 11

environmental monitoring 1

redundancy 1

ROM monitor 26

startup configuration 25

static routes 11

synchronizing configurations 11, 10

Supervisor Engine 7L-E, selecting the uplink port 22

Supervisor Engine II-TS

insufficient inline power handling 22, 12

Smartports macros

See also Auto Smartports macros

SVI Autostate Exclude

understanding 3

SVI Autostate exclude

configuring 8

S-VLAN 2, 7

switch 2

switch access with RADIUS, controlling 98

switch ports

See access ports

switched packets

and ACLs 27

Switched Port Analyzer

See SPAN

switchport

show interfaces 34, 35, 44

switchport access vlan command 5, 7

switchport block multicast command 2

switchport block unicast command 2

switchport mode access command 7

switchport mode dot1q-tunnel command 6

switchport mode dynamic command 5

switchport mode trunk command 5

switchport trunk allowed vlan command 6

switchport trunk encapsulation command 5

switchport trunk native vlan command 6

switchport trunk pruning vlan command 6

switch-to-RADIUS server communication

configuring 34

sysret command 5

system

reviewing configuration 10

settings at startup 27

system alarms

overview 6

system and network statistics, displaying 24

system capabilities TLV 2

system clock

configuring

daylight saving time 13

manually 11

summer time 13

time zones 12

displaying the time and date 12

overview 2

See also NTP

system description TLV 2

system images

loading from Flash memory 30

modifying boot field 27

specifying 30

system message logging

default configuration 3

defining error message severity levels 8

disabling 3

displaying the configuration 12

enabling 4

facility keywords, described 12

level keywords, described 8

limiting messages 9

message format 2

overview 1

sequence numbers, enabling and disabling 7

setting the display destination device 4

synchronizing log messages 5

timestamps, enabling and disabling 6

UNIX syslog servers

configuring the daemon 10

configuring the logging facility 11

facilities supported 12

system MTU

802.1Q tunneling 5

maximums 5

system name

manual configuration 22

See also DNS

system name TLV 2

system prompt, default setting 21

T

TACACS+ 1

accounting, defined 16

authentication, defined 16

authorization, defined 16

configuring

accounting 21

authentication key 18

authorization 21

login authentication 19

default configuration 18

displaying the configuration 22

identifying the server 18

limiting the services to the user 21

operation of 17

overview 15

tracking services accessed by user 21

tagged packets

802.1Q 3

Layer 2 protocol 13

TCAM programming and ACLs 7

for Sup II-Plust thru V-10GE 7

TCAM programming and ACLs for Sup 6-E 10

TDR

checking cable connectivity 3

enabling and disabling test 3

guidelines 3

Telnet

accessing CLI 2

disconnecting user sessions 7

executing 5

monitoring user sessions 6

telnet command 6

templates, Ethernet OAM 45

Terminal Access Controller Access Control System Plus

See TACACS+

TFTP

configuration files in base directory 5

configuring for autoconfiguration 4

limiting access by servers 15

TFTP download

See also console download

threshold monitoring, IP SLAs 6

time

See NTP and system clock

Time Domain Reflectometer

See TDR

time exceeded messages 9

time zones 12

timer

See login timer

timestamps in log messages 6

TLV

host presence detection 8

TLVs

defined 7, 2

LLDP-MED 2

Token Ring

media not supported (note) 5, 9

Topology change notification processing

MLD Snooping

Topology change notification processing 4

TOS

description 4

trace command 9

traceroute

See IP traceroute

See Layer 2 Traceroute

traceroute mac command 11

traceroute mac ip command 11

track state, tracking IP SLAs 9

tracked lists

configuring 3

types 3

tracked objects

by Boolean expression 4

by threshold percentage 6

by threshold weight 5

tracking interface line-protocol state 2

tracking IP routing state 2

tracking objects 1

tracking process 1

traffic

blocking flooded 2

traffic control

using ACLs (figure) 4

using VLAN maps (figure) 6

traffic marking procedure flowchart 21, 55

traffic shaping 9

translational bridge numbers (defaults) 5

traps

configuring MAC address notification 31

configuring MAC move notification 33

configuring MAC threshold notification 35

configuring managers 11

defined 3

enabling 31, 33, 35, 11

notification types 11

overview 1, 4

troubleshooting

with CiscoWorks 4

with system message logging 1

with traceroute 8

troubleshooting high CPU due to ACLs 7

trunk failover

See link-state tracking

trunk ports

configure port security 17

configuring PVLAN 19–21

trunks

802.1Q restrictions 4

configuring 5

configuring access VLANs 5

configuring allowed VLANs 6

default interface configuration 5

enabling to non-DTP device 4

specifying native VLAN 6

understanding 3

trustpoint 3

tunnel ports

802.1Q, configuring 5

described 2

incompatibilities with other features 5

tunneling

defined 1

TwinGig Convertors

limitations on using 14

port numbering 13

selecting X2/TwinGig Convertor mode 14

type length value

See TLV

type of service

See TOS

U

UDLD

configuring probe message interval per-interface 8

default configuration 3

disabling on fiber-optic interfaces 7

disabling on non-fiber-optic interfaces 7

displaying link status 9

enabling globally 5

enabling per-interface 6

modes of operation 3

resetting disabled LAN interfaces 8

use case 2

UDLD, overview 1

UDP jitter operation, IP SLAs 8

UDP jitter, configuring 9

unauthorized ports with 802.1X 5

unicast

See IP unicast

unicast flood blocking

configuring 1

unicast MAC address filtering

and adding static addresses 38

and broadcast MAC addresses 37

and CPU packets 37

and multicast addresses 37

and router MAC addresses 37

configuration guidelines 37

described 37

unicast MAC address filtering, configuring

ACLs

configuring unicast MAC address filtering 14

Unicast RPF (Unicast Reverse Path Forwarding)

applying 5

BGP attributes

caution 4

CEF

requirement 2

tables 7

configuring 9

(examples) ??–12

BOOTP 8

DHCP 8

enterprise network (figure) 6

prerequisites 9

routing table requirements 7

tasks 9

verifying 10

deploying 5

description 22, 1

disabling 11

enterprise network (figure) 6

FIB 2

implementing 4

packets, dropping (figure) 4

prerequisites 9

restrictions

basic 8

routing asymmetry 7

routing asymmetry (figure) 8

routing table requirements 7

security policy

applying 5

attacks, mitigating 5

deploying 5

tunneling 5

source addresses, validating 3

(figure) 3, 4

failure 3

traffic filtering 5

tunneling 5

validation

failure 3, 4

packets, dropping 3

source addresses 3

verifying 10

unicast traffic

blocking 2

Unidirectional Controlled Port, configuring 802.1X 69

unidirectional ethernet

enabling 2

example of setting 2

overview 1

UniDirectional Link Detection Protocol

See UDLD

Universal PoE, configuring 16

UNIX syslog servers

daemon configuration 10

facilities supported 12

message logging configuration 11

uplink forwarding

quad-supervisor 6

uplink mode, selecting on supervisor engine 6-E 17

uplink port, selecting on a supervisor engine 7L-E 22

UplinkFast

and MST 23

enabling 23

MST and 23

overview 19

usage examples, Wireshark 18

user EXEC mode 5

user sessions

disconnecting 7

monitoring 6

user-defined event triggers

configuring, 802.1X-based 8

configuring, MAC address-based 9

User-defined triggers and built-in macros, configuring mapping 9

V

VACLs

Layer 4 port operations 10

virtual configuration register 3

virtual LANs

See VLANs

virtual ports, MKA 3

Virtual Router Redundancy Protocol, introduction 23

Virtual Switch System(VSS), displaying EtherChannel to 20

VLAN ACLs

See VLAN maps

VLAN blocking, REP 13

vlan command 6

vlan dot1q tag native command 4

VLAN ID

service provider 8

VLAN ID translation

See VLAN mapping

VLAN ID, discovering 44

VLAN load balancing

REP 4

VLAN load balancing on flex links 2

configuration guidelines 5

VLAN load balancing, triggering 6

VLAN Management Policy Server

See VMPS

VLAN mapping

1-to-1 7

1-to-1, configuring 10

configuration guidelines 9

configuring 10

configuring on a trunk port 10

default 9

described 2, 7

selective QinQ 8

selective Q-in-Q, configuring 12

traditional QinQ 8

traditional Q-in-Q, configuring 11

types of 7

VLAN maps

applying to a VLAN 23

configuration example 24

configuration guidelines 20

configuring 19

creating and deleting entries 20

defined 41

denying access example 25

denying packets 21

displaying 26

order of entries 20

permitting packets 21

router ACLs and 27

using (figure) 5

using in your network 23

VLAN maps, PACL and Router ACLs 34

VLAN Trunking Protocol

See VTP

VLAN trunks

overview 3

VLAN User Distribution, configuring 802.1X 71

VLANs

allowed on trunk 6

configuration guidelines 3

configuring 5

configuring as Layer 3 interfaces 8

customer numbering in service-provider networks 3

default configuration 4

description 11

extended range 3

IDs (default) 4

interface assignment 7

limiting source traffic with RSPAN 23

monitoring with RSPAN 21

name (default) 4

normal range 3

overview 1

reserved range 3

See also PVLANs

VMPS

configuration file example 31

configuring dynamic access ports on client 24

configuring retry interval 26

database configuration file 31

dynamic port membership

example 28

reconfirming 25, 26

reconfirming assignments 25

reconfirming membership interval 26

server overview 20

VMPS client

administering and monitoring 27

configure switch

configure reconfirmation interval 26

dynamic ports 24

entering IP VMPS address 24

reconfirm VLAM membership 25

reconfirmation interval 26

default configuration 23

dynamic VLAN membership overview 23

troubleshooting dynamic port VLAN membership 28

VMPS server

fall-back VLAN 22

illegal VMPS client requests 22

overview 20

security modes

multiple 22

open 21

secure 21

voice aware 802.1x security

port-based authentication

configuring 77

described 22, 76

voice interfaces

configuring 1

Voice over IP

configuring 1

voice ports

configuring VVID 3

voice traffic 2, 5

voice VLAN

IP phone data traffic, described 2

IP phone voice traffic, described 2

voice VLAN ports

using 802.1X 22

Voice VLAN, configure 802.1X 75

VPN

configuring routing in 8

forwarding 3

routes 2

routing and forwarding table

See VRF

VRF

defining 3

tables 1

VRF-aware services

ARP 6, 15, 17

configuring 6, 15

ftp 16

ping 15

tftp 16

traceroute 16

uRPF 16

VRF-lite

description 22

VSS

dual-active detection

displaying 54

Enhanced PAgP, advantages 23

enhanced PAgP, configuring 52

Enhanced PAgP, description 23

fast-hello, configuring 53

VTP

client, configuring 16

configuration guidelines 12

default configuration 13

disabling 16

Layer 2 protocol tunneling 13

monitoring 19

overview 7

pruning

configuring 15

See also VTP version 2

server, configuring 16

statistics 19

transparent mode, configuring 16

version 2

enabling 15

VTP advertisements

description 9

VTP domains

description 8

VTP modes 8

VTP pruning

overview 10

VTP versions 2 and 3

overview 9

See also VTP

VTY and Network Assistant 12

VVID (voice VLAN ID)

and 802.1X authentication 22

configuring 3

W

WCCP

configuration examples 9

configuring on a router 2, 13

features 3

restrictions 5

service groups 5

Web Cache Communication Protocol

See WCCP 1

web cache services

description 4

web caches

See cache engines

web caching

See web cache services

See also WCCP

web-based authentication

authentication proxy web pages 4

description 43, 14, 1

web-based authentication, interactions with other features 4

weight thresholds in tracked lists 5

Wireshark

activating and deactivating, capture points, conceptual 10

attachment points 6

capture filter 7

capture points 6

core system filter 7

decoding and displaying packets 9

display filter 7

feature interactions 10

filters 6

storing captured packets to a.pcap filter 8

usage examples 18

Wireshark, about 5

Wireshark, activating and deactivating a capture point 14

Wireshark, defining/modifying/deleting a capture point 12

Wireshark, displaying information 14

WS-X46490-CSFP-E, support on a 10-slot chassis 17

X

X.509v3 Certificates for SSH Authentication

Overview 2

Y

Y.1731

default configuration 29

described 27

ETH-AIS

Ethernet Alarm Signal function (ETH-AIS)

28

ETH-RDI 28

multicast Ethernet loopback 31

multicast ETH-LB 29

terminology 27