xxvii
Catalyst 2950 Desktop Switch Software Configuration Guide
78-14982-01
Preface Organization
Chapter 8, Configuring 802.1X Port-Based Authentication, describes how to configure 80 2.1X
port-based authe n tication to prevent unauthorized devices (clients ) from gaining access to the network.
As LA Ns extend to hot el s, air por ts, a nd c or porat e l ob bi es, in secur e environme nts c ou ld b e cr eat ed.
Chapter 9, Configuring the Switch Interfaces, defines the types of interfaces on the switch. It describes
the interface global co nfigur ation c omm and an d p rovides pr ocedu re s f or configur ing physic al
interfaces.
Chapter 10, Configuring LRE, descri bes how to c onfigure L RE- specific fe a tures o n your swi tch .
Chapter 11, Configuring STP, describes how to configure the Spanni ng Tree Prot ocol (STP ) on your
switch.
Chapter 12, Configuring RSTP and MSTP, de scribes how to configure the Ci sco imple mentation of
the IEEE 802.1W Rapid STP (RSTP) and the IEEE 802.1S Multiple STP (MSTP) on your switch. RSTP
provides r ap id c onvergence, an d M STP en ab les VLA Ns to be grou pe d in to a sp an ning- tre e inst ance .
Chapter 13, Configuring Optional Spanning-Tree Features, describes how to configure option al
spannin g-tree fea tures tha t can be used when your swi tch is runni ng the per-VLA N spannin g-tree
(PVST ) or th e MSTP.
Chapter 14, Configuring VLANs, describes how to create and maintain VLANs. It includes
inform ati on a bout t he V LAN dat aba se , VL AN configur ation m odes, exten de d-ran ge VLA Ns, V LAN
trunks, and the VLAN Membership Policy Server (VMPS).
Chapter 15, Configuring VTP, desc ribe s how to use the VL AN Trunking Proto col (VT P) VLAN
database f or mana gin g VL ANs. It incl udes V TP c hara cteris tic s and c onfiguration .
Chapter 16, Configuring Voice VLAN, describes how to configure voice VLANs on the switch for a
connection to an IP phone.
Chapter 17, Con fig uring IGMP Snooping an d MVR, de scribe s how to configure Intern et Group
Management Protocol (IGMP) snooping. It also describes Multicast VLAN Registration (MVR), a local
IGMP sn oopi ng f ea tur e availa ble on the swit ch, a nd how to u se IGM P filteri ng t o cont rol m ultic ast
group mem bership.
Chapter 18, Configuring Port-Based T raf fi c Control, describes how to reduce traffic storms by setting
broadcast, multicast, and unicast storm-control threshold levels; how to protect ports from receiving
traff ic from other ports on a switch; how to configure port security by using secure MAC addresses; and
how to set the aging time for all secure addresses.
Chapter 20, Configuring CDP, descr ibes how to c on figure C isco Di scovery Prot ocol (CD P) on you r
switch.
Chapter 21, Configuring SPAN and RSPAN, describes how to configure Switched Port Ana lyzer
(SPAN) a nd Remot e SPAN (RSPAN), whi ch se lect n et work tr affic for anal y sis by a net work a nal yzer
such as a SwitchProbe device or other Remote Monitoring (RMON) probe.
Chapter 22, Configuring RMON, describes how to configure remote monitoring (RMON). The
RMON feature, which is used with the Simple Network Management Protocol (SNMP) agent in the
switch, means that you can monitor all the traffic flowing among switches on all connected LAN
segments.
Chapter 23, Configuring System Message Logging, describe s how to configure system me ssage
logging. It describes the message format and how to change the message display destination device, limit
the typ e of me ssage s sent, c onfigure the UN IX ser ver sysl og da em on, a nd define the UN IX syste m
logging facility and timestamp messages.
Chapter 24, Configuring SNMP, desc ribes h ow to c onfigure the Si mp le N etwork M ana geme nt
Protocol (SNMP). It describes how to configure community strings, enable trap managers and traps, set
the agent contact and location information, and how to limit TFTP servers used through SNMP.