Main              
Catalyst 2950 and Catalyst 2955 Switch  Software Configuration Guide
            Page
              CONTENTS
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
              Preface
Audience                
Purpose
              Conventions
              Related Publications
              Obtaining Documentation and Submitting a Service Request
              Overview
Features              
Ease of Deployment and Ease of Use
              Performance
              Manageability
              Redundancy
              VLAN Support
Security              
Quality of Service and Class of Service
              Monitoring
LRE Features (available only on Catalyst 2950 LRE switches)              
Management Options
Management Interface Options              
Advantages of Using Network Assistant and Clustering Switches
              Network Configuration Examples
Design Concepts for Using the Switch            
Page
            Page
              Small to Medium-Sized Network Configuration
              Collapsed Backbone and Switch Cluster Configuration
              Hotel Network Configuration
            Page
1-18              
Service-Provider Central-Office Configuration
            Page
              Large Campus Configuration
              Multidwelling Network Using Catalyst 2950 Switches
            Page
              Long-Distance, High-Bandwidth Transport Configuration
              Where to Go Next
              Using the Command-Line Interface
Cisco IOS Command Modes            
Page
              Getting Help
              Abbreviating Commands
Using no and default Forms of Commands              
Understanding CLI Messages
Using Command History                
Changing the Command History Buffer Size
Recalling Commands                
Disabling the Command History Feature
              Using Editing Features
Enabling and Disabling Editing Features              
Editing Commands through Keystrokes
              Editing Command Lines that Wrap
              Searching and Filtering Output of show and more Commands
Accessing the CLI            
Page
              Configuring Catalyst 2955 Switch Alarms
Understanding Catalyst 2955 Switch Alarms              
Global Status Monitoring Alarms
FCS Error Hysteresis Threshold               
Port Status Monitoring Alarms
Triggering Alarm Options              
Configuring Catalyst 2955 Switch Alarms
Default Catalyst 2955 Switch Alarm Configuration              
Configuring the Power Supply Alarm
Setting the Power Mode                
Setting the Power Supply Alarm Options
              Configuring the Switch Temperature Alarms
Setting a Secondary Temperature Threshold for the Switch                
Associating the Temperature Alarms to a Relay
              Configuring the FCS Bit Error Rate Alarm
              Setting the FCS Error Threshold
Setting the FCS Error Hysteresis Threshold              
Configuring Alarm Profiles
Creating or Modifying an Alarm Profile              
Attaching an Alarm Profile to a Specific Port
Enabling SNMP Traps              
Displaying Catalyst 2955 Switch Alarms Status
            Page
              Assigning the Switch IP Address and Default  Gateway
Understanding the Boot Process              
Assigning Switch Information
              Default Switch Information
Understanding DHCP-Based Autoconfiguration              
DHCP Client Request Process
              Configuring DHCP-Based Autoconfiguration
DHCP Server Configuration Guidelines              
Configuring the TFTP Server
              Configuring the DNS
Configuring the Relay Device              
Obtaining Configuration Files
              Example Configuration
              Understanding DHCP-Based Autoconfiguration with a Saved Configuration
Limitations and Restrictions              
Configuring DHCP-Based Autoconfiguration with a saved configuration
Manually Assigning IP Information              
Checking and Saving the Running Configuration
              Modifying the Startup Configuration
Default Boot Configuration                
Automatically Downloading a Configuration File 
              Specifying the Filename to Read and Write the System Configuration
Booting Manually              
Booting a Specific Software Image
              Controlling Environment Variables
              Scheduling a Reload of the Software Image
              Configuring a Scheduled Reload
              Displaying Scheduled Reload Information
            Page
              Configuring Cisco IOS CNS Agents
Understanding Cisco Configuration Engine Software              
Configuration Service
              Event Service
NameSpace Mapper                
What You Should Know About the CNS IDs and Device Hostnames
              ConfigID
DeviceID                
Hostname and DeviceID
Using Hostname, DeviceID, and ConfigID              
Understanding Cisco IOS Agents
Initial Configuration              
Incremental (Partial) Configuration
Synchronized Configuration              
Configuring Cisco IOS Agents
Enabling Automated CNS Configuration              
Enabling the CNS Event Agent
              Enabling the Cisco IOS CNS Agent
Enabling an Initial Configuration            
Page
              Enabling a Partial Configuration
              Displaying CNS Configuration
              Clustering Switches
Understanding Switch Clusters              
Cluster Command Switch Characteristics
              Standby Cluster Command Switch Characteristics
Candidate Switch and Member Switch Characteristics              
Planning a Switch Cluster
              Automatic Discovery of Cluster Candidates and Members
Discovery Through CDP Hops              
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices
              Discovery Through Different VLANs
Discovery Through Different Management VLANs              
Discovery of Newly Installed Switches
              HSRP and Standby Cluster Command Switches
              Virtual IP Addresses
Other Considerations for Cluster Standby Groups              
Automatic Recovery of Cluster Configuration
              IP Addresses
Hostnames                
Passwords
              SNMP Community Strings
TACACS+ and RADIUS                
LRE Profiles    
Catalyst 1900 and Catalyst 2820 CLI Considerations              
Using SNMP to Manage Switch Clusters
            Page
            Page
              Administering the Switch
Managing the System Time and Date                
Understanding the System Clock 
              Understanding Network Time Protocol
              Configuring NTP
              Default NTP Configuration
Configuring NTP Authentication              
Configuring NTP Associations
              Configuring NTP Broadcast Service
            Page
              Configuring NTP Access Restrictions
Creating an Access Group and Assigning a Basic IP Access List              
Disabling NTP Services on a Specific Interface 
              Configuring the Source IP Address for NTP Packets
Displaying the NTP Configuration              
Configuring Time and Date Manually
Setting the System Clock                
Displaying the Time and Date Configuration
              Configuring the Time Zone 
Configuring Summer Time (Daylight Saving Time)            
Page
              Configuring a System Name and Prompt
              Default System Name and Prompt Configuration
Configuring a System Name                
Understanding DNS
              Default DNS Configuration
Setting Up DNS                
Displaying the DNS Configuration
              Creating a Banner
Default Banner Configuration                
Configuring a Message-of-the-Day Login Banner
              Configuring a Login Banner
              Managing the MAC Address Table
              Building the Address Table
MAC Addresses and VLANs                
Default MAC Address Table Configuration
              Changing the Address Aging Time
Removing Dynamic Address Entries                
Configuring MAC Address Notification Traps
            Page
              Adding and Removing Static Address Entries
              Configuring Unicast MAC Address Filtering
            Page
              Managing the ARP Table
              Configuring Switch-Based Authentication
Preventing Unauthorized Access to Your Switch              
Protecting Access to Privileged EXEC Commands
Default Password and Privilege Level Configuration              
Setting or Changing a Static Enable Password
              Protecting Enable and Enable Secret Passwords with Encryption
              Disabling Password Recovery
              Setting a Telnet Password for a Terminal Line
              Configuring Username and Password Pairs
              Configuring Multiple Privilege Levels
Setting the Privilege Level for a Command              
Changing the Default Privilege Level for Lines
Logging into and Exiting a Privilege Level              
Controlling Switch Access with TACACS+ 
Understanding TACACS+            
Page
              TACACS+ Operation
Configuring TACACS+              
Default TACACS+ Configuration
Identifying the TACACS+ Server Host and Setting the Authentication Key              
Configuring TACACS+ Login Authentication
            Page
              Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
Starting TACACS+ Accounting                
Displaying the TACACS+ Configuration
              Controlling Switch Access with RADIUS 
Understanding RADIUS            
Page
              RADIUS Operation
Configuring RADIUS              
Default RADIUS Configuration
Identifying the RADIUS Server Host             
Page
            Page
              Configuring RADIUS Login Authentication
            Page
              Defining AAA Server Groups
            Page
              Configuring RADIUS Authorization for User Privileged Access and Network Services
              Starting RADIUS Accounting
Configuring Settings for All RADIUS Servers              
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
              Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
              Displaying the RADIUS Configuration
              Configuring the Switch for Local Authentication and  Authorization
              Configuring the Switch for Secure Shell
Understanding SSH                 
SSH Servers, Integrated Clients, and Supported Versions
Limitations               
Configuring SSH
Configuration Guidelines              
Cryptographic Software Image Guidelines
Setting Up the Switch to Run SSH              
Configuring the SSH Server
              Displaying the SSH Configuration and Status
            Page
              Configuring IEEE 802.1x Port-Based  Authentication
Understanding IEEE 802.1x Port-Based Authentication              
Device Roles
              Authentication Initiation and Message Exchange
              Ports in Authorized and Unauthorized States
              IEEE 802.1x Host Mode
              IEEE 802.1x Accounting
IEEE 802.1x Accounting Attribute-Value Pairs              
Using IEEE 802.1x Authentication with VLAN Assignment
              Using IEEE 802.1x Authentication with Guest VLAN
              Using IEEE 802.1x Authentication with Restricted VLAN
              Using IEEE 802.1x Authentication with Voice VLAN Ports
Using IEEE 802.1x Authentication with Port Security              
Using IEEE 802.1x Authentication with Wake-on-LAN
Network Admission Control Layer 2 IEEE 802.1x Validation              
Configuring IEEE 802.1x Authentication
Default IEEE 802.1x Authentication Configuration              
IEEE 802.1x Authentication Configuration Guidelines
              IEEE 802.1x Authentication
VLAN Assignment, Guest VLAN, and Restricted VLAN              
Upgrading from a Previous Software Release
Configuring IEEE 802.1x Authentication            
Page
              Configuring the Switch-to-RADIUS-Server Communication
              Configuring the Host Mode
              Enabling Periodic Re-Authentication
Manually Re-Authenticating a Client Connected to a Port              
Changing the Quiet Period
Changing the Switch-to-Client Retransmission Time              
Setting the Switch-to-Client Frame-Retransmission Number
              Configuring IEEE 802.1x Accounting
              Configuring a Guest VLAN
              Configuring a Restricted VLAN
            Page
              Configuring IEEE 802.1x Authentication with WoL
              Configuring NAC Layer 2 IEEE 802.1x Validation
Resetting the IEEE 802.1x Configuration to the Default Values              
Displaying IEEE 802.1x Statistics and Status
              Configuring Interface Characteristics
Understanding Interface Types              
Access Ports
Trunk Ports              
Port-Based VLANs
EtherChannel Port Groups                
Connecting Interfaces
              Using the Interface Command
              Procedures for Configuring Interfaces
Configuring a Range of Interfaces            
Page
              Configuring and Using Interface-Range Macros
              Configuring Ethernet Interfaces
              Default Ethernet Interface Configuration
              Configuring Interface Speed and Duplex Mode 
Configuration Guidelines            
Page
              Setting the Interface Speed and Duplex Parameters on a Non-LRE Switch Port
Setting the Interface Speed and Duplex Parameters on an LRE Switch Port              
Configuring Media Types for Gigabit Ethernet Interfaces on LRE Switches
Configuring IEEE 802.3x Flow Control on IEEE 802.3z Gigabit Ethernet Ports              
Adding a Description for an Interface 
Configuring Loopback Detection              
Monitoring and Maintaining the Interfaces
              Monitoring Interface and Controller Status 
Clearing and Resetting Interfaces and Counters              
Shutting Down and Restarting the Interface
            Page
              Configuring Smartports Macros
Understanding Smartports Macros              
Configuring Smartports Macros
Default Smartports Macro Configuration              
Smartports Macro Configuration Guidelines
              Creating Smartports Macros
              Applying Smartports Macros
              Applying Cisco-Default Smartports Macros
            Page
              Displaying Smartports Macros
              Configuring LRE
Understanding LRE Features                
Ports on the Catalyst 2950 LRE Switches
              LRE Links and LRE Profiles 
LRE Profiles             
Page
            Page
              LRE Sequences
              CPE Ethernet Links
              LRE Link Monitor
LRE Message Logging Process              
Configuring LRE Ports
Default LRE Configuration              
Environmental Guidelines for LRE Links
              Guidelines for Using LRE Profiles
CPE Ethernet Link Guidelines              
Guidelines for Configuring Cisco 575 LRE CPEs and 576 LRE 997 CPEs
Guidelines for Configuring Cisco 585 LRE CPEs              
Assigning a Global Profile to All LRE Ports
Assigning a Profile to a Specific LRE Port              
Assigning a Global Sequence to All LRE Ports
Assigning a Sequence to a Specific LRE Port              
Using Rate Selection to Automatically Assign Profiles
              Precedence
Profile Locking              
Link Qualification and SNR Margins
            Page
            Page
              Configuring LRE Link Persistence
Configuring LRE Link Monitor                
Configuring LRE Interleave 
              Configuring Upstream Power Back-Off
              Configuring CPE Toggle
              Configuring Syslog Export
              Upgrading LRE Switch Firmware
Configuring for an LRE Upgrade              
Performing an LRE Upgrade
Global Configuration of LRE Upgrades                
Controller Configuration of LRE Upgrades
              LRE Upgrade Details
12-26              
LRE Upgrade Example
This example shows how an LRE upgrade occurs:                 
The CPE device is reset and the link is down. Ethernet connectivity is unavailable at this point.
Upgrade data transfer is complete. Reset the CPE device.                
The CPE device has finished resetting. The desired profile is applied.
              Displaying LRE Status
            Page
              Configuring STP
Understanding Spanning-Tree Features              
STP Overview
Spanning-Tree Topology and BPDUs              
Bridge ID, Switch Priority, and Extended System ID
              Spanning-Tree Interface States
              Blocking State
              Listening State
Learning State                
Forwarding State
Disabled State              
How a Switch or Port Becomes the Root Switch or Root Port
Spanning Tree and Redundant Connectivity              
Spanning-Tree Address Management
Accelerated Aging to Retain Connectivity              
Spanning-Tree Modes and Protocols
Supported Spanning-Tree Instances                
Spanning-Tree Interoperability and Backward Compatibility
STP and IEEE 802.1Q Trunks              
Configuring Spanning-Tree Features
              Default Spanning-Tree Configuration
Spanning-Tree Configuration Guidelines              
Changing the Spanning-Tree Mode
              Disabling Spanning Tree
              Configuring the Root Switch
            Page
              Configuring a Secondary Root Switch
              Configuring the Port Priority
              Configuring the Path Cost
              Configuring the Switch Priority of a VLAN
              Configuring Spanning-Tree Timers
Configuring the Hello Time              
Configuring the Forwarding-Delay Time for a VLAN
Configuring the Maximum-Aging Time for a VLAN              
Configuring Spanning Tree for Use in a Cascaded Stack
              Displaying the Spanning-Tree Status
            Page
              Configuring MSTP
              Understanding MSTP
Multiple Spanning-Tree Regions                
IST, CIST, and CST
              Operations Within an MST Region
Operations Between MST Regions              
Hop Count
              Boundary Ports
Interoperability with IEEE 802.1D STP              
Understanding RSTP
Port Roles and the Active Topology              
Rapid Convergence
              Synchronization of Port Roles
              Bridge Protocol Data Unit Format and Processing
Processing Superior BPDU Information                
Processing Inferior BPDU Information
              Topology Changes
              Configuring MSTP Features
Default MSTP Configuration              
MSTP Configuration Guidelines
              Specifying the MST Region Configuration and Enabling MSTP
              Configuring the Root Switch
              Configuring a Secondary Root Switch
              Configuring the Port Priority
              Configuring the Path Cost
              Configuring the Switch Priority
              Configuring the Hello Time
              Configuring the Forwarding-Delay Time
Configuring the Maximum-Aging Time              
Configuring the Maximum-Hop Count
Specifying the Link Type to Ensure Rapid Transitions                
Restarting the Protocol Migration Process
              Displaying the MST Configuration and Status
              Configuring Optional Spanning-Tree Features
Understanding Optional Spanning-Tree Features              
Understanding Port Fast
Understanding BPDU Guard              
Understanding BPDU Filtering
Understanding UplinkFast            
Page
              Understanding Cross-Stack UplinkFast
              How CSUF Works
              Events that Cause Fast Convergence
              Limitations
Connecting the Stack Ports                
15-9
Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide OL-10101-02                
2 34 56 7 8 910 910 910 910
              Understanding BackboneFast
Catalyst 3500 XL                
Catalyst 2950G-12
GigaStack GBIC connection for fast convergence                
Catalyst 3500
            Page
              Understanding EtherChannel Guard
              Understanding Root Guard
Understanding Loop Guard              
Configuring Optional Spanning-Tree Features
Default Optional Spanning-Tree Configuration              
Optional Spanning-Tree Configuration Guidelines
Enabling Port Fast              
Enabling BPDU Guard
              Enabling BPDU Filtering
              Enabling UplinkFast for Use with Redundant Links
              Enabling Cross-Stack UplinkFast
              Enabling BackboneFast
Enabling EtherChannel Guard              
Enabling Root Guard
Enabling Loop Guard              
Displaying the Spanning-Tree Status
            Page
              Configuring VLANs
Understanding VLANs              
Supported VLANs
              VLAN Port Membership Modes
              Configuring Normal-Range VLANs
              Token Ring VLANs
Normal-Range VLAN Configuration Guidelines               
VLAN Configuration Mode Options
VLAN Configuration in config-vlan Mode                
VLAN Configuration in VLAN Configuration Mode
Saving VLAN Configuration              
Default Ethernet VLAN Configuration
              Creating or Modifying an Ethernet VLAN
              Deleting a VLAN
              Assigning Static-Access Ports to a VLAN
              Configuring Extended-Range VLANs
Default VLAN Configuration                
Extended-Range VLAN Configuration Guidelines
              Creating an Extended-Range VLAN
              Displaying VLANs
Configuring VLAN Trunks              
Trunking Overview
              IEEE 802.1Q Configuration Considerations
              Default Layer 2 Ethernet Interface VLAN Configuration
Configuring an Ethernet Interface as a Trunk Port                
Interaction with Other Features
              Configuring a Trunk Port
              Defining the Allowed VLANs on a Trunk
              Changing the Pruning-Eligible List
Configuring the Native VLAN for Untagged Traffic              
Load Sharing Using STP
Load Sharing Using STP Port Priorities            
Page
              Load Sharing Using STP Path Cost
              Configuring VMPS
Understanding VMPS              
Dynamic Port VLAN Membership
VMPS Database Configuration File              
Default VMPS Client Configuration
VMPS Configuration Guidelines              
Configuring the VMPS Client
Entering the IP Address of the VMPS                
Configuring Dynamic Access Ports on VMPS Clients
              Reconfirming VLAN Memberships
Changing the Reconfirmation Interval                
Changing the Retry Count
              Monitoring the VMPS
              Troubleshooting Dynamic Port VLAN Membership
VMPS Configuration Example              
16-30
              Configuring VTP
Understanding VTP              
The VTP Domain 
VTP Modes              
VTP Advertisements
              VTP Version 2
VTP Pruning            
Page
              Configuring VTP 
Default VTP Configuration                
VTP Configuration Options
              VTP Configuration in Global Configuration Mode
VTP Configuration in VLAN Configuration Mode              
VTP Configuration Guidelines
Domain Names                
Passwords
Upgrading from Previous Software Releases                
VTP Version
              Configuring a VTP Server
            Page
              Configuring a VTP Client
              Disabling VTP (VTP Transparent Mode)
              Enabling VTP Version 2
              Enabling VTP Pruning
Adding a VTP Client Switch to a VTP Domain              
Monitoring VTP
            Page
              Configuring Voice VLAN
Understanding Voice VLAN              
Configuring Voice VLAN
Default Voice VLAN Configuration              
Voice VLAN Configuration Guidelines
Configuring a Port to Connect to a Cisco 7960 IP Phone              
Configuring Ports to Carry Voice Traffic in IEEE 802.1Q Frames
Configuring Ports to Carry Voice Traffic in IEEE 802.1p Priority-Tagged Frames              
Overriding the CoS Priority of Incoming Data Frames
Configuring the IP Phone to Trust the CoS Priority of Incoming Data Frames              
Displaying Voice VLAN
              Configuring Port-Based Traffic Control
Configuring Storm Control                
Understanding Storm Control
              Default Storm Control Configuration
Configuring Storm Control and Threshold Levels            
Page
              Configuring Protected Ports
              Configuring Port Blocking
Blocking Flooded Traffic on an Interface                
Resuming Normal Forwarding on a Port
              Configuring Port Security
Understanding Port Security                
Secure MAC Addresses
              Security Violations
              Default Port Security Configuration
Port Security Configuration Guidelines              
Enabling and Configuring Port Security
            Page
              Enabling and Configuring Port Security Aging
            Page
              Displaying Port-Based Traffic Control Settings
            Page
              Configuring DHCP Features
Understanding DHCP Features              
DHCP Server
DHCP Relay Agent                
DHCP Snooping
              Option-82 Data Insertion
            Page
              Configuring DHCP Features
Default DHCP Configuration                
Circuit ID Suboption Frame Format
Remote ID Suboption Frame Format              
DHCP Snooping Configuration Guidelines
              Configuring the DHCP Server
Enabling DHCP Snooping and Option 82              
Displaying DHCP Information
              Configuring IGMP Snooping and MVR
Understanding IGMP Snooping              
IGMP Versions
              Joining a Multicast Group
              Leaving a Multicast Group
              Immediate-Leave Processing
IGMP Configurable-Leave Timer                 
IGMP Report Suppression
Source-Only Networks              
Configuring IGMP Snooping
              Default IGMP Snooping Configuration
Enabling or Disabling IGMP Snooping              
Setting the Snooping Method
              Configuring a Multicast Router Port
Configuring a Host Statically to Join a Group              
Enabling IGMP Immediate-Leave Processing
Configuring the IGMP Leave Timer              
Disabling IGMP Report Suppression
              Disabling IP Multicast-Source-Only Learning
Configuring the Aging Time              
Displaying IGMP Snooping Information
              Understanding Multicast VLAN Registration
              Using MVR in a Multicast Television Application
            Page
              Configuring MVR
Default MVR Configuration                
MVR Configuration Guidelines and Limitations
              Configuring MVR Global Parameters
              Configuring MVR Interfaces
              Displaying MVR Information
              Configuring IGMP Filtering and Throttling
Default IGMP Filtering and Throttling Configuration              
Configuring IGMP Profiles
              Applying IGMP Profiles
              Setting the Maximum Number of IGMP Groups
Configuring the IGMP Throttling Action              
Displaying IGMP Filtering and Throttling Configuration
            Page
              Configuring UDLD
Understanding UDLD                
Modes of Operation
              Methods to Detect Unidirectional Links
              Configuring UDLD
              Default UDLD Configuration
              Enabling UDLD Globally
Enabling UDLD on an Interface              
Resetting an Interface Shut Down by UDLD
              Displaying UDLD Status
            Page
              Configuring CDP
Understanding CDP              
Configuring CDP
Default CDP Configuration                
Configuring the CDP Characteristics
              Disabling and Enabling CDP
Disabling and Enabling CDP on an Interface              
Monitoring and Maintaining CDP
            Page
            Page
              Configuring SPAN and RSPAN
Understanding SPAN and RSPAN            
Page
              SPAN and RSPAN Concepts and Terminology
SPAN Session                
Traffic Types
              Source Port 
Destination Port                
Reflector Port
SPAN Traffic              
SPAN and RSPAN Interaction with Other Features
              SPAN and RSPAN Session Limits
Default SPAN and RSPAN Configuration              
Configuring SPAN
SPAN Configuration Guidelines              
Creating a SPAN Session and Specifying Ports to Monitor
              Creating a SPAN Session and Enabling Ingress Traffic
              Removing Ports from a SPAN Session
              Configuring RSPAN
RSPAN Configuration Guidelines              
Configuring a VLAN as an RSPAN VLAN
              Creating an RSPAN Source Session
              Creating an RSPAN Destination Session
              Removing Ports from an RSPAN Session
24-16              
Displaying SPAN and RSPAN Status
              Configuring RMON
Understanding RMON              
Configuring RMON
              Default RMON Configuration
Configuring RMON Alarms and Events              
Configuring RMON Collection on an Interface
            Page
              Displaying RMON Status
              Configuring System Message Logging
Understanding System Message Logging              
Configuring System Message Logging
System Log Message Format              
Default System Message Logging Configuration
Disabling and Enabling Message Logging              
Setting the Message Display Destination Device
              Synchronizing Log Messages
              Enabling and Disabling Timestamps on Log Messages
              Enabling and Disabling Sequence Numbers in Log Messages
              Defining the Message Severity Level
              Limiting Syslog Messages Sent to the History Table and to SNMP
              Configuring UNIX Syslog Servers
Logging Messages to a UNIX Syslog Daemon              
Configuring the UNIX System Logging Facility
              Displaying the Logging Configuration
              Configuring SNMP
Understanding SNMP              
SNMP Versions
              SNMP Manager Functions
SNMP Agent Functions              
SNMP Community Strings
Using SNMP to Access MIB Variables                 
SNMP Notifications
              Configuring SNMP
Default SNMP Configuration              
SNMP Configuration Guidelines
              Disabling the SNMP Agent
Configuring Community Strings            
Page
              Configuring SNMP Groups and Users
            Page
              Configuring SNMP Notifications
            Page
            Page
              Setting the Agent Contact and Location Information
              Limiting TFTP Servers Used Through SNMP
SNMP Examples              
Displaying SNMP Status
              Configuring Network Security with ACLs
              Understanding ACLs
              Handling Fragmented and Unfragmented Traffic
              Understanding Access Control Parameters
              Guidelines for Applying ACLs to Physical Interfaces
              Configuring ACLs
              Unsupported Features
Creating Standard and Extended IP ACLs                
ACL Numbers
              Creating a Numbered Standard ACL
            Page
              Creating a Numbered Extended ACL
            Page
            Page
              Creating Named Standard and Extended ACLs
              Applying Time Ranges to ACLs
            Page
              Including Comments About Entries in ACLs
              Creating Named MAC Extended ACLs
              Creating MAC Access Groups
              Applying ACLs to Terminal Lines or Physical Interfaces
Applying ACLs to a Terminal Line                
Applying ACLs to a Physical Interface
              Displaying ACL Information
Displaying ACLs              
Displaying Access Groups
              Examples for Compiling ACLs
            Page
              Numbered ACL Examples
Extended ACL Examples                
Named ACL Example
Commented IP ACL Entry Examples            
Page
            Page
              Configuring QoS
              Understanding QoS
              Basic QoS Model
              Classification
              Classification Based on QoS ACLs 
Classification Based on Class Maps and Policy Maps              
Policing and Marking
              Mapping Tables
Queueing and Scheduling                
How Class of Service Works
              Port Priority
Port Scheduling                
Egress CoS Queues
              Configuring Auto-QoS
Generated Auto-QoS Configuration            
Page
              Effects of Auto-QoS on the Configuration
              Upgrading from a Previous Software Release
              Enabling Auto-QoS for VoIP
              Displaying Auto-QoS Information
Auto-QoS Configuration Example              
29-15
              Configuring Standard QoS
              Default Standard QoS Configuration
            Page
              Configuring Classification Using Port Trust States
Configuring the Trust State on Ports within the QoS Domain              
Configuring the CoS Value for an Interface
              Configuring Trusted Boundary
            Page
              Enabling Pass-Through Mode 
              Configuring a QoS Policy
Classifying Traffic by Using ACLs            
Page
            Page
            Page
              Classifying Traffic by Using Class Maps
              Classifying, Policing, and Marking Traffic by Using Policy Maps 
            Page
            Page
              Configuring CoS Maps
Configuring the CoS-to-DSCP Map              
Configuring the DSCP-to-CoS Map
            Page
              Configuring the Egress Queues
Configuring CoS Priority Queues                
Configuring WRR Priority
Enabling the Expedite Queue and Configuring WRR Priority              
Displaying Standard QoS Information
              Standard QoS Configuration Examples
              QoS Configuration for the Existing Wiring Closet
              QoS Configuration for the Intelligent Wiring Closet
            Page
              Configuring EtherChannels
Understanding EtherChannels            
Page
              Understanding Port-Channel Interfaces
Understanding the Port Aggregation Protocol and Link Aggregation Protocol              
PAgP and LACP Modes
Exchanging PAgP Packets                
Exchanging LACP Packets
              Physical Learners and Aggregate-Port Learners
PAgP and LACP Interaction with Other Features              
EtherChannel On Mode
Understanding Load Balancing and Forwarding Methods              
Configuring EtherChannels
              Default EtherChannel Configuration
EtherChannel Configuration Guidelines              
Configuring Layer 2 EtherChannels
            Page
              Configuring EtherChannel Load Balancing
              Configuring the PAgP Learn Method and Priority
Configuring the LACP Port Priority              
Configuring Hot Standby Ports
Configuring the LACP System Priority              
Displaying EtherChannel, PAgP, and LACP Status
              Troubleshooting
Using Recovery Procedures              
Recovering from a Software Failure
Recovering from Lost or Forgotten Passwords on Non-LRE Catalyst 2950  Switches            
Page
              Recovering from Lost or Forgotten Passwords on Catalyst 2950 LRE Switches
              Password Recovery with Password Recovery Enabled
              Procedure with Password Recovery Disabled
              Recovering from Lost or Forgotten Passwords on Catalyst 2955 Switches
            Page
            Page
              Recovering from a Command Switch Failure
Replacing a Failed Command Switch with a Cluster Member            
Page
              Replacing a Failed Command Switch with Another Switch
Recovering from Lost Member Connectivity              
Preventing Autonegotiation Mismatches
              GBIC and SFP Module Security and Identification
Diagnosing Connectivity Problems                
Using Ping
Understanding Ping               
Executing Ping
              Using Layer 2 Traceroute
Understanding Layer 2 Traceroute                
Usage Guidelines
Displaying the Physical Path              
Diagnosing LRE Connection Problems
              Using Debug Commands
              Enabling Debugging on a Specific Feature
Enabling All-System Diagnostics              
Redirecting Debug and Error Message Output
Using the debug auto qos Command               
Using the show controllers Commands
Using the crashinfo File            
Page
APPENDIX              
A
Supported MIBs                
MIB List
            Page
              Using FTP to Access the MIB Files
            Page
APPENDIX              
B
Working with the Cisco IOS File System,  Configuration Files, and Software Images                
Working with the Flash File System
              Displaying Available File Systems
              Setting the Default File System
Displaying Information about Files on a File System                
Changing Directories and Displaying the Working Directory
              Creating and Removing Directories
Copying Files              
Deleting Files
Creating, Displaying, and Extracting tar Files                
Creating a tar File
              Displaying the Contents of a tar File
Extracting a tar File                
Displaying the Contents of a File
              Working with Configuration Files
              Guidelines for Creating and Using Configuration Files
              Configuration File Types and Location
Creating a Configuration File By Using a Text Editor                
Copying Configuration Files By Using TFTP
              Preparing to Download or Upload a Configuration File By Using TFTP
Downloading the Configuration File By Using TFTP                
Uploading the Configuration File By Using TFTP
              Copying Configuration Files By Using FTP
              Preparing to Download or Upload a Configuration File By Using FTP
Downloading a Configuration File By Using FTP              
Uploading a Configuration File By Using FTP
              Copying Configuration Files By Using RCP
              Preparing to Download or Upload a Configuration File By Using RCP
              Downloading a Configuration File By Using RCP
Uploading a Configuration File By Using RCP              
Clearing Configuration Information
Clearing the Startup Configuration File                
Deleting a Stored Configuration File
              Working with Software Images
Image Location on the Switch              
tar File Format of Images on a Server or .com
              Copying Image Files By Using TFTP
Preparing to Download or Upload an Image File By Using TFTP              
Downloading an Image File By Using TFTP
Uploading an Image File By Using TFTP              
Copying Image Files By Using FTP
              Preparing to Download or Upload an Image File By Using FTP
              Downloading an Image File By Using FTP
              Uploading an Image File By Using FTP
              Copying Image Files By Using RCP
              Preparing to Download or Upload an Image File By Using RCP
              Downloading an Image File By Using RCP
            Page
              Uploading an Image File By Using RCP
            Page
            Page
               
INDEX                
Numerics
A            
Page
               
B              
 
C            
Page
            Page
               
D            
Page
               
E              
 
F              
 
G                
H
               
I              
 
J              
 
L              
 
M            
Page
               
N              
 
O                
P
            Page
            Page
               
Q              
 
R            
Page
               
S            
Page
            Page
            Page
            Page
               
T              
 
U              
 
V            
Page
               
W                
X