Manuals
Brands
Computer Equipment
Switch
IBM
Computer Equipment
Switch
IBM
12.1(22)EA6 manual
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
550
Download on canonical page
550
pages
, 5.74 Mb
Cisco Systems Intelligent Gigabit Ethernet
Switch Modules for the IBM BladeCenter
Software Configuration Guide
Cisco IOS Release 12.1(22)EA6
1
2
3
4
72
164
264
374
480
550
MENU
Models
12.1(22)EA6
Contents
3
CONTENTS
23
Preface
Audience
Purpose
24
Conventions
25
Related Publications
27
Overview
Features
Ease of Use and Ease of Deployment
Performance
28
Manageability
29
Redundancy
30
VLAN Support
Security
31
Quality of Service and Class of Service
Monitoring
32
Management Options
Management Interface Options
1-7
33
Network Configuration Examples
Figure 1-1, Figure 1-2, and Figure 1-3 show three different network configurations.
1-8
34
Where to Go Next
Before configuring the switch, review these sections for start-up information:
35
Using the Command-Line Interface
Cisco IOS Command Modes
37
Getting Help
38
Abbreviating Commands
Using no and default Forms of Commands
39
Understanding CLI Messages
Using Command History
Changing the Command History Buffer Size
Recalling Commands
Disabling the Command History Feature
40
Using Editing Features
Enabling and Disabling Editing Features
41
Editing Commands through Keystrokes
42
Editing Command Lines that Wrap
43
Searching and Filtering Output of show and more Commands
Accessing the CLI
45
Assigning the Switch IP Address and Default Gateway
Understanding the Boot Process
46
Assigning Switch Information
Default Switch Information
47
Manually Assigning IP Information
48
Checking and Saving the Running Configuration
49
3-5
50
Modifying the Startup Configuration
51
Default Boot Configuration
Specifying the Filename to Read and Write the System Configuration
52
Booting a Specific Software Image
Controlling Environment Variables
55
Scheduling a Reload of the Software Image
Configuring a Scheduled Reload
56
Displaying Scheduled Reload Information
57
Administering the Switch
Managing the System Time and Date
Understanding the System Clock
58
Understanding Network Time Protocol
59
Configuring NTP
60
Default NTP Configuration
Configuring NTP Authentication
61
Configuring NTP Associations
62
Configuring NTP Broadcast Service
63
Configuring NTP Access Restrictions
64
Creating an Access Group and Assigning a Basic IP Access List
Disabling NTP Services on a Specific Interface
65
Configuring the Source IP Address for NTP Packets
Displaying the NTP Configuration
66
Configuring Time and Date Manually
Setting the System Clock
67
Displaying the Time and Date Configuration
Configuring the Time Zone
68
Configuring Summer Time (Daylight Saving Time)
69
Configuring a System Name and Prompt
70
Default System Name and Prompt Configuration
Configuring a System Name
Understanding DNS
71
Default DNS Configuration
Setting Up DNS
Displaying the DNS Configuration
72
Creating a Banner
Default Banner Configuration
Configuring a Message-of-the-Day Login Banner
Configuring a Login Banner
74
Managing the MAC Address Table
75
Building the Address Table
MAC Addresses and VLANs
76
Default MAC Address Table Configuration
Changing the Address Aging Time
Removing Dynamic Address Entries
77
Configuring MAC Address Notification Traps
79
Adding and Removing Static Address Entries
Displaying Address Table Entries
80
Managing the ARP Table
81
Configuring Switch-Based Authentication
Preventing Unauthorized Access to Your Switch
82
Protecting Access to Privileged EXEC Commands
Default Password and Privilege Level Configuration
83
Setting or Changing a Static Enable Password
84
Protecting Enable and Enable Secret Passwords with Encryption
85
Setting a Telnet Password for a Terminal Line
86
Configuring Username and Password Pairs
Configuring Multiple Privilege Levels
87
Setting the Privilege Level for a Command
88
Changing the Default Privilege Level for Lines
Logging into and Exiting a Privilege Level
89
Controlling Switch Access with TACACS+
Understanding TACACS+
91
TACACS+ Operation
Configuring TACACS+
92
Default TACACS+ Configuration
Identifying the TACACS+ Server Host and Setting the Authentication Key
93
Configuring TACACS+ Login Authentication
95
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
Starting TACACS+ Accounting
Displaying the TACACS+ Configuration
96
Controlling Switch Access with RADIUS
97
Understanding RADIUS
98
RADIUS Operation
99
Configuring RADIUS
Default RADIUS Configuration
Identifying the RADIUS Server Host
102
Configuring RADIUS Login Authentication
104
Defining AAA Server Groups
106
Configuring RADIUS Authorization for User Privileged Access and Network Services
107
Starting RADIUS Accounting
108
Configuring Settings for All RADIUS Servers
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
109
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
110
Displaying the RADIUS Configuration
111
Configuring the Switch for Local Authentication and Authorization
112
Configuring the Switch for Secure Shell
Understanding SSH
SSH Servers, Integrated Clients, and Supported Versions
Limitations
113
Configuring SSH
Configuration Guidelines
114
Cryptographic Software Image Guidelines
Setting Up the Switch to Run SSH
115
Configuring the SSH Server
116
Displaying the SSH Configuration and Status
117
Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
118
Device Roles
119
Authentication Initiation and Message Exchange
120
Ports in Authorized and Unauthorized States
121
IEEE 802.1x Accounting
IEEE 802.1x Accounting Attribute-Value Pairs
122
IEEE 802.1x Host Mode
123
Using IEEE 802.1x with Port Security
124
Using IEEE 802.1x with Voice VLAN Ports
Using IEEE 802.1x with VLAN Assignment
125
Using IEEE 802.1x with Guest VLAN
126
Using IEEE 802.1x with Wake-on-LAN
Unidirectional State
Bidirectional State
127
Configuring IEEE 802.1x Authentication
Default IEEE 802.1x Configuration
128
IEEE 802.1x Configuration Guidelines
129
Enabling IEEE 802.1x Authentication
130
Configuring the Switch-to-RADIUS-Server Communication
132
Configuring IEEE 802.1x Authentication Using a RADIUS Server
Enabling Periodic Re-Authentication
133
Manually Re-Authenticating a Client Connected to a Port
Changing the Quiet Period
134
Changing the Switch-to-Client Retransmission Time
135
Setting the Switch-to-Client Frame-Retransmission Number
136
Configuring the Host Mode
Configuring a Guest VLAN
138
Resetting the IEEE 802.1x Configuration to the Default Values
Configuring IEEE 802.1x Authentication
140
Configuring IEEE 802.1x Accounting
141
Displaying IEEE 802.1x Statistics and Status
143
Configuring Interface Characteristics
Understanding Interface Types
144
Access Ports
Trunk Ports
145
Port-Based VLANs
EtherChannel Port Groups
Connecting Interfaces
146
Using the Interface Command
147
Procedures for Configuring Interfaces
148
Configuring a Range of Interfaces
149
Configuring and Using Interface-Range Macros
151
Configuring Ethernet Interfaces
Default Ethernet Interface Configuration
152
Configuring Interface Speed and Duplex Mode
153
Configuration Guidelines
Setting the Interface Speed and Duplex Parameters
154
Adding a Description for an Interface
155
Monitoring and Maintaining the Interfaces
Monitoring Interface and Controller Status
157
Clearing and Resetting Interfaces and Counters
Shutting Down and Restarting the Interface
159
Configuring Smartports Macros
Understanding Smartports Macros
160
Configuring Smartports Macros
Default Smartports Macro Configuration
Smartports Macro Configuration Guidelines
162
Creating Smartports Macros
163
Applying Smartports Macros
164
Applying Cisco-Default Smartports Macros
166
Displaying Smartports Macros
167
Configuring STP
Understanding Spanning-Tree Features
168
STP Overview
169
Spanning-Tree Topology and BPDUs
170
Bridge ID, Switch Priority, and Extended System ID
Spanning-Tree Interface States
171
Blocking State
172
Listening State
Learning State
Forwarding State
Disabled State
173
How a Switch or Port Becomes the Root Switch or Root Port
174
Spanning Tree and Redundant Connectivity
Spanning-Tree Address Management
Accelerated Aging to Retain Connectivity
175
Spanning-Tree Modes and Protocols
Supported Spanning-Tree Instances
176
Spanning-Tree Interoperability and Backward Compatibility
STP and IEEE 802.1Q Trunks
Spanning Tree Considerations for Cisco Systems Intelligent Gigabit Ethernet Switch Modules
177
Configuring Spanning-Tree Features
178
Default Spanning-Tree Configuration
Spanning-Tree Configuration Guidelines
179
Changing the Spanning-Tree Mode
180
Disabling Spanning Tree
181
Configuring the Root Switch
183
Configuring a Secondary Root Switch
Configuring the Port Priority
185
Configuring the Path Cost
186
Configuring the Switch Priority of a VLAN
187
Configuring Spanning-Tree Timers
Configuring the Hello Time
188
Configuring the Forwarding-Delay Time for a VLAN
Configuring the Maximum-Aging Time for a VLAN
189
Displaying the Spanning-Tree Status
191
Configuring MSTP
192
Understanding MSTP
Multiple Spanning-Tree Regions
IST, CIST, and CST
193
Operations Within an MST Region
194
Hop Count
Interoperability with IEEE 802.1D STP
195
Understanding RSTP
Port Roles and the Active Topology
196
Rapid Convergence
197
Synchronization of Port Roles
198
Bridge Protocol Data Unit Format and Processing
Processing Superior BPDU Information
Processing Inferior BPDU Information
199
Topology Changes
200
Configuring MSTP Features
201
Default MSTP Configuration
MSTP Configuration Guidelines
202
Specifying the MST Region Configuration and Enabling MSTP
203
Configuring the Root Switch
205
Configuring a Secondary Root Switch
Configuring the Port Priority
207
Configuring the Path Cost
208
Configuring the Switch Priority
Configuring the Hello Time
209
Configuring the Forwarding-Delay Time
210
Configuring the Maximum-Aging Time
Configuring the Maximum-Hop Count
211
Specifying the Link Type to Ensure Rapid Transitions
Restarting the Protocol Migration Process
212
Displaying the MST Configuration and Status
213
Configuring Optional Spanning-Tree Features
Understanding Optional Spanning-Tree Features
214
Understanding Port Fast
215
Understanding BPDU Guard
Understanding BPDU Filtering
216
Understanding UplinkFast
217
Understanding BackboneFast
220
Understanding EtherChannel Guard
Understanding Root Guard
Understanding Loop Guard
221
Configuring Optional Spanning-Tree Features
222
Default Optional Spanning-Tree Configuration
Optional Spanning-Tree Configuration Guidelines
Enabling Port Fast
223
Enabling BPDU Guard
224
Enabling BPDU Filtering
225
Enabling UplinkFast for Use with Redundant Links
226
Enabling BackboneFast
227
Enabling EtherChannel Guard
Enabling Root Guard
228
Enabling Loop Guard
229
Displaying the Spanning-Tree Status
231
Configuring VLANs
Understanding VLANs
232
Supported VLANs
233
VLAN Port Membership Modes
234
Configuring Normal-Range VLANs
235
Token Ring VLANs
Normal-Range VLAN Configuration Guidelines
236
VLAN Configuration Mode Options
VLAN Configuration in config-vlan Mode
VLAN Configuration in VLAN Configuration Mode
237
Saving VLAN Configuration
Default Ethernet VLAN Configuration
238
Creating or Modifying an Ethernet VLAN
240
Deleting a VLAN
Assigning Static-Access Ports to a VLAN
241
Configuring Extended-Range VLANs
242
Default VLAN Configuration
Extended-Range VLAN Configuration Guidelines
Creating an Extended-Range VLAN
243
Displaying VLANs
244
Configuring VLAN Trunks
Trunking Overview
246
IEEE 802.1Q Configuration Considerations
247
Default Layer 2 Ethernet Interface VLAN Configuration
Configuring an Ethernet Interface as a Trunk Port
248
Interaction with Other Features
Configuring a Trunk Port
249
Defining the Allowed VLANs on a Trunk
250
Changing the Pruning-Eligible List
251
Configuring the Native VLAN for Untagged Traffic
252
Load Sharing Using STP
Load Sharing Using STP Port Priorities
254
Load Sharing Using STP Path Cost
255
Configuring VMPS
256
Understanding VMPS
Dynamic Port VLAN Membership
VMPS Database Configuration File
257
Default VMPS Client Configuration
VMPS Configuration Guidelines
258
Configuring the VMPS Client
Entering the IP Address of the VMPS
Configuring Dynamic Access Ports on VMPS Clients
259
Reconfirming VLAN Memberships
Changing the Reconfirmation Interval
Changing the Retry Count
260
Monitoring the VMPS
261
Troubleshooting Dynamic Port VLAN Membership
VMPS Configuration Example
262
12-32
263
Configuring VTP
Understanding VTP
264
The VTP Domain
265
VTP Modes
VTP Advertisements
266
VTP Version 2
VTP Pruning
268
Configuring VTP
Default VTP Configuration
269
VTP Configuration Options
VTP Configuration in Global Configuration Mode
VTP Configuration in VLAN Configuration Mode
270
VTP Configuration Guidelines
Domain Names
Passwords
VTP Version
Configuration Requirements
271
Configuring a VTP Server
272
Configuring a VTP Client
273
Disabling VTP (VTP Transparent Mode)
274
Enabling VTP Version 2
275
Enabling VTP Pruning
276
Adding a VTP Client Switch to a VTP Domain
277
Monitoring VTP
279
Configuring IGMP Snooping and MVR
280
Understanding IGMP Snooping
IGMP Versions
281
Joining a Multicast Group
283
Leaving a Multicast Group
284
Immediate-Leave Processing
IGMP Configurable-Leave Timer
IGMP Report Suppression
Source-Only Networks
285
Configuring IGMP Snooping
286
Default IGMP Snooping Configuration
Enabling or Disabling IGMP Snooping
287
Setting the Snooping Method
288
Configuring a Multicast Router Port
Configuring a Host Statically to Join a Group
289
Enabling IGMP Immediate-Leave Processing
290
Configuring the IGMP Leave Timer
Disabling IGMP Report Suppression
291
Disabling IP Multicast-Source-Only Learning
Configuring the Aging Time
292
Displaying IGMP Snooping Information
293
Understanding Multicast VLAN Registration
294
Using MVR in a Multicast Television Application
295
Configuring MVR
296
Default MVR Configuration
MVR Configuration Guidelines and Limitations
Configuring MVR Global Parameters
298
Configuring MVR Interfaces
299
Displaying MVR Information
Configuring IGMP Filtering and Throttling
300
Default IGMP Filtering and Throttling Configuration
301
Configuring IGMP Profiles
302
Applying IGMP Profiles
303
Setting the Maximum Number of IGMP Groups
Configuring the IGMP Throttling Action
305
Displaying IGMP Filtering and Throttling Configuration
307
Configuring Port-Based Traffic Control
Configuring Storm Control
Understanding Storm Control
308
Default Storm Control Configuration
Configuring Storm Control and Threshold Levels
309
Configuring Protected Ports
310
Configuring Port Security
Understanding Port Security
311
Secure MAC Addresses
Security Violations
312
Default Port Security Configuration
Port Security Configuration Guidelines
313
Enabling and Configuring Port Security
315
Enabling and Configuring Port Security Aging
317
Displaying Port-Based Traffic Control Settings
319
Configuring UDLD
Understanding UDLD
Modes of Operation
320
Methods to Detect Unidirectional Links
322
Configuring UDLD
Default UDLD Configuration
323
Enabling UDLD Globally
324
Enabling UDLD on an Interface
Resetting an Interface Shut Down by UDLD
325
Displaying UDLD Status
327
Configuring CDP
Understanding CDP
328
Configuring CDP
Default CDP Configuration
Configuring the CDP Characteristics
329
Disabling and Enabling CDP
330
Disabling and Enabling CDP on an Interface
331
Monitoring and Maintaining CDP
333
Configuring SPAN and RSPAN
Understanding SPAN and RSPAN
335
SPAN and RSPAN Concepts and Terminology
SPAN Session
Traffic Types
336
Source Port
Destination Port
337
Reflector Port
SPAN Traffic
338
SPAN and RSPAN Interaction with Other Features
SPAN and RSPAN Session Limits
Default SPAN and RSPAN Configuration
339
Configuring SPAN
SPAN Configuration Guidelines
340
Creating a SPAN Session and Specifying Ports to Monitor
341
Creating a SPAN Session and Enabling Ingress Traffic
343
Removing Ports from a SPAN Session
344
Configuring RSPAN
RSPAN Configuration Guidelines
345
Configuring a VLAN as an RSPAN VLAN
346
Creating an RSPAN Source Session
347
Creating an RSPAN Destination Session
348
Removing Ports from an RSPAN Session
18-17
349
Displaying SPAN and RSPAN Status
351
Configuring RMON
Understanding RMON
352
Configuring RMON
353
Default RMON Configuration
Configuring RMON Alarms and Events
355
Configuring RMON Collection on an Interface
356
Displaying RMON Status
357
Configuring System Message Logging
Understanding System Message Logging
358
Configuring System Message Logging
System Log Message Format
359
Default System Message Logging Configuration
360
Disabling and Enabling Message Logging
Setting the Message Display Destination Device
362
Synchronizing Log Messages
363
Enabling and Disabling Timestamps on Log Messages
364
Enabling and Disabling Sequence Numbers in Log Messages
Defining the Message Severity Level
366
Limiting Syslog Messages Sent to the History Table and to SNMP
Configuring UNIX Syslog Servers
367
Logging Messages to a UNIX Syslog Daemon
Configuring the UNIX System Logging Facility
368
Displaying the Logging Configuration
369
Configuring SNMP
Understanding SNMP
370
SNMP Versions
371
SNMP Manager Functions
SNMP Agent Functions
372
SNMP Community Strings
Using SNMP to Access MIB Variables
SNMP Notifications
373
Configuring SNMP
Default SNMP Configuration
374
SNMP Configuration Guidelines
Disabling the SNMP Agent
375
Configuring Community Strings
376
Configuring SNMP Groups and Users
378
Configuring SNMP Notifications
381
Setting the Agent Contact and Location Information
Limiting TFTP Servers Used Through SNMP
382
SNMP Examples
383
Displaying SNMP Status
385
Configuring Network Security with ACLs
386
Understanding ACLs
387
Handling Fragmented and Unfragmented Traffic
388
Understanding Access Control Parameters
389
Guidelines for Applying ACLs to Physical Interfaces
390
Configuring ACLs
Unsupported Features
391
Creating Standard and Extended IP ACLs
ACL Numbers
392
Creating a Numbered Standard ACL
393
Creating a Numbered Extended ACL
396
Creating Named Standard and Extended ACLs
398
Applying Time Ranges to ACLs
400
Including Comments About Entries in ACLs
401
Creating Named MAC Extended ACLs
Creating MAC Access Groups
402
Applying ACLs to Terminal Lines or Physical Interfaces
403
Applying ACLs to a Terminal Line
Applying ACLs to a Physical Interface
404
Displaying ACL Information
Displaying ACLs
405
Displaying Access Groups
406
Examples for Compiling ACLs
407
Numbered ACL Examples
Extended ACL Examples
Named ACL Example
Commented IP ACL Entry Examples
409
Configuring QoS
410
Understanding QoS
411
Basic QoS Model
412
Classification
413
Classification Based on QoS ACLs
Classification Based on Class Maps and Policy Maps
414
Policing and Marking
415
Mapping Tables
Queueing and Scheduling
How Class of Service Works
Port Priority
416
Port Scheduling
Egress CoS Queues
417
Configuring Auto-QoS
Generated Auto-QoS Configuration
419
Effects of Auto-QoS on the Configuration
420
Enabling Auto-QoS for VoIP
421
Displaying Auto-QoS Information
422
Auto-QoS Configuration Example
424
Configuring Standard QoS
Default Standard QoS Configuration
425
Configuring Classification Using Port Trust States
426
Configuring the Trust State on Ports within the QoS Domain
427
Configuring the CoS Value for an Interface
428
Configuring Trusted Boundary
430
Enabling Pass-Through Mode
431
Configuring a QoS Policy
Classifying Traffic by Using ACLs
435
Classifying Traffic by Using Class Maps
436
Classifying, Policing, and Marking Traffic by Using Policy Maps
439
Configuring CoS Maps
440
Configuring the CoS-to-DSCP Map
441
Configuring the DSCP-to-CoS Map
442
Configuring the Egress Queues
Configuring CoS Priority Queues
443
Configuring WRR Priority
Enabling the Expedite Queue and Configuring WRR Priority
444
Displaying Standard QoS Information
Standard QoS Configuration Examples
445
QoS Configuration for the Existing Wiring Closet
446
QoS Configuration for the Intelligent Wiring Closet
449
Configuring EtherChannels and Layer 2 Trunk Failover
Understanding EtherChannels
450
Understanding Port-Channel Interfaces
451
Understanding the Port Aggregation Protocol and Link Aggregation Protocol
452
PAgP and LACP Modes
Exchanging PAgP Packets
Exchanging LACP Packets
453
Physical Learners and Aggregate-Port Learners
PAgP and LACP Interaction with Other Features
454
EtherChannel On Mode
Understanding Load Balancing and Forwarding Methods
456
Configuring EtherChannels
Default EtherChannel Configuration
EtherChannel Configuration Guidelines
457
Configuring Layer 2 EtherChannels
459
Configuring EtherChannel Load Balancing
460
Configuring the PAgP Learn Method and Priority
461
Configuring the LACP Port Priority
Configuring Hot Standby Ports
462
Configuring the LACP System Priority
463
Displaying EtherChannel, PAgP, and LACP Status
Understanding Layer 2 Trunk Failover
464
Configuring Layer 2 Trunk Failover
Default Layer 2 Trunk Failover Configuration
465
Layer 2 Trunk Failover Configuration Guidelines
Configuring Layer 2 Trunk Failover
466
Displaying Layer 2 Trunk Failover Status
467
Troubleshooting
Using Recovery Procedures
Recovering from a Software Failure
468
Recovering from Lost or Forgotten Passwords
470
Password Recovery with Password Recovery Enabled
471
Procedure with Password Recovery Disabled
473
Preventing Autonegotiation Mismatches
SFP Module Security and Identification
Diagnosing Connectivity Problems
474
Using Ping
Understanding Ping
Executing Ping
475
Using Layer 2 Traceroute
Understanding Layer 2 Traceroute
Usage Guidelines
476
Displaying the Physical Path
477
Using Debug Commands
Enabling Debugging on a Specific Feature
478
Enabling All-System Diagnostics
Redirecting Debug and Error Message Output
Using the debug auto qos Command
479
Using the crashinfo File
481
A
Supported MIBs
MIB List
483
Using FTP to Access the MIB Files
485
B
Working with the Cisco IOS File System, Configuration Files, and Software Images
Working with the Flash File System
486
Displaying Available File Systems
487
Setting the Default File System
Displaying Information about Files on a File System
488
Changing Directories and Displaying the Working Directory
Creating and Removing Directories
489
Copying Files
490
Deleting Files
Creating, Displaying, and Extracting tar Files
Creating a tar File
491
Displaying the Contents of a tar File
Extracting a tar File
Displaying the Contents of a File
492
Working with Configuration Files
493
Guidelines for Creating and Using Configuration Files
494
Configuration File Types and Location
Creating a Configuration File By Using a Text Editor
Copying Configuration Files By Using TFTP
Preparing to Download or Upload a Configuration File By Using TFTP
495
Downloading the Configuration File By Using TFTP
Uploading the Configuration File By Using TFTP
496
Copying Configuration Files By Using FTP
497
Preparing to Download or Upload a Configuration File By Using FTP
Downloading a Configuration File By Using FTP
498
Uploading a Configuration File By Using FTP
499
Copying Configuration Files By Using RCP
500
Preparing to Download or Upload a Configuration File By Using RCP
501
Downloading a Configuration File By Using RCP
502
Uploading a Configuration File By Using RCP
Clearing Configuration Information
Clearing the Startup Configuration File
Deleting a Stored Configuration File
503
Working with Software Images
504
Image Location on the Switch
tar File Format of Images on a Server or IBM.com
505
Copying Image Files By Using TFTP
Preparing to Download or Upload an Image File By Using TFTP
506
Downloading an Image File By Using TFTP
507
Uploading an Image File By Using TFTP
508
Copying Image Files By Using FTP
Preparing to Download or Upload an Image File By Using FTP
509
Downloading an Image File By Using FTP
511
Uploading an Image File By Using FTP
512
Copying Image Files By Using RCP
Preparing to Download or Upload an Image File By Using RCP
513
Downloading an Image File By Using RCP
515
Uploading an Image File By Using RCP
517
C
Getting Help and Technical Assistance
Before You Call
518
Using the Documentation
Getting Help and Information from the World Wide Web
Software Service and Support
Hardware Service and Support
519
D
Notices
520
Edition Notice
Trademarks
523
INDEX
Numerics
A
525
B
C
526
D
528
E
529
F
G
H
530
I
531
J
L
532
M
534
N
O
P
537
Q
538
R
540
S
543
T
545
U
V
547
W
X