xxix
Catalyst 3550 Multilayer Switch Software Configuration Guide
78-11194-03
Preface Organization
Chapter 14, “Configuring UDLD,” describes how to configure the UniDirectional Link Detection
(UDLD) feature. UDLD enables devices connected through fiber-optic or twisted-pair Ethernet cables
to monitor the physical configuration of the cables and detect when a unidirectional link exists.
Chapter 15, “Configuring SPAN,” describes how to configure Switch Port Analyzer (SPAN), which
selects network traffic for analysis by a network analyzer such as a SwitchProbe device or ot her Remo te
Monitoring (RMON) probe. SPAN mirrors traffic received or sent (or both) on a sou rce port , or t raffic
received on one or more source ports or source VLANs, to a destination port.
Chapter 16, “Configuring RMON,” describes how to configure remote mon itor ing (RM ON ). T he
RMON feature, which is used with the Simple Network Management Protocol (SNMP) agent in the
switch, means that you can monitor all the traffic flowing am ong sw it ches on a ll c onn ect ed L AN
segments.
Chapter 17, “Configuring System Message Logging,” describes how to configure system message
logging. It describes the message format, how to change the message display destination device, lim it
the type of messages sent, configure UNIX server syslog daemon and define the UNIX system loggi ng
facility, and timestamp messages.
Chapter 18, “Configuring SNMP,” describes how to configure the Simple Network Management
Protocol (SNMP). It describes how to configure community strings, enable trap managers and t raps, set
the agent contact and location information, and how to limit TFTP servers used through SNMP.
Chapter 19, “Configuring Network Security with ACLs,” describes how to configure ne tw ork secu rit y
on your switch using two types of access control lists (ACLs), router ACLs and VLAN ma ps. It describes
how to apply ACLs to interfaces and provides examples.
Chapter 20, “Configuring QoS,” describes how to configure quality of service (QoS) on your switch.
With this feature, you can provide preferential treatment to certain types traffic.
Chapter 21, “Configuring EtherChannel,” describes how to bundle a set of indiv idual ports into a single
logical link on Layer 2 and Layer 3 interfaces.
Chapter 22, “Configuring IP Unicast Routing,” describes how to configuring IP unicast rout ing on your
switch, including configuring IP addressing features, Routing Inform atio n Pr otoc ol ( RIP), Inte rior
Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF) protocol, and Enhanced IGRP
(EIGRP). To use this feature, you must have the enhanced multilayer software image installed on your
switch.
Chapter 23, “Configuring HSRP,” describes how to use Hot Standby Router Protocol (HSRP) to provide
routing redundancy for routing IP traffic without depending on the availability of any single router. To
use this feature, you must have the enhanced multilayer software image installed on your swi tch.
Chapter 24, “Configuring IP Multicast Routing,” how to configuring IP multicast routing. It describes
how to use and configure the Internet Group Managem en t Pro toco l (IG MP) , Prot o col- Ind ep ende nt
Multicast (PIM) protocol, Cisco Group Management Protocol (CGMP) server functionali ty, and how to
inter-operate between PIM and Distance Vector Multicast Routing Protocol (DVMRP) domains. To use
this feature, you must have the enhanced multilayer software image installed on your switch.
Chapter 25, “Configuring MSDP,” describes how to configure the Multicast Source Discovery Protocol
(MSDP), which is a mechanism to connect multiple PIM sparse-mode domains. To use this feature, you
must have the enhanced multilayer software image installed on your switch.
Chapter 26, “Configuring Fallback Bridging,” describes how to configure fallbac k bri dg ing o n you r
switch. With fallback bridging, you can bridge non-IP protocols between VLAN bridge domains and
routed ports. To use this feature, you must have the enhanced multilayer software image installed on your
switch
Chapter 27, “Troubleshooting,” describes how to identify and resolve soft ware problems relate d to the
IOS software.