CHAPT ER
8-1
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-21521-01
8
Configuring SDM Templates
This chapter describes how to configure the Switch Database Management (SDM) templates on the
Catalyst 3750-X or 3560-X switch. Unless otherwise noted, the term switch refers to a Catalyst 3750-X
or 3560-X standalone switch and to a Catalyst 3750-X switch stack.
Note For complete syntax and usage information for the commands used in this chapter, see the command
reference for this release.
This chapter consists of these sections:
Understanding the SDM Templates, page 8-1
Configuring the Switch SDM Template, page 8-4
Displaying the SDM Templates, page 8-6

Understanding the SDM Templates

You can use SDM templates to configure system resources in the switch to optimize support for specific
features, depending on how the switch is used in the network. You can select a template to provide
maximum system usage for some functions; for example, use the default template to balance resources,
and use access template to obtain maximum ACL usage. To allocate hardware resources for different
usages, the switch SDM templates prioritize system resources to optimize support for certain features.
You can select SDM templates for IP Version 4 (IPv4) to optimize these features on switches running
the IP base or IP services feature set:
Note Do not select a routing template (sdm prefer routing) when the switch is running the LAN base feature
set. Although visible in the command-line help, the LAN base feature set does not support routing. On
switches running the LAN base feature set, routing values shown in the templates are not valid.
Routing—The routing template maximizes system resources for unicast routing, typically required
for a router or aggregator in the center of a network.
VLANs—The VLAN template disables routing and supports the maximum number of unicast MAC
addresses. It would typically be selected for a Layer 2 switch.
Default—The default template gives balance to all functions.
Access—The access template maximizes system resources for access control lists (ACLs) to
accommodate a large number of ACLs.