Main
Cisco IE 2000 Switch Software Configuration Guide
Page
CONTENTS
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Preface
Audience
Purpose
Conventions
Related Publications
Obtaining Documentation, Obtaining Support, and Security Guidelines
Page
Configuration Overview
Features
Feature Software Licensing
Ease-of-Deployment and Ease-of-Use Features
Performance Features
Management Options
Industrial Application
Manageability Features
Availability and Redundancy Features
VLAN Features
Security Features
Page
Page
QoS and CoS Features
Monitoring Features
Default Settings After Initial Switch Configuration
Page
Page
Network Configuration Examples
Design Concepts for Using the Switch
Ethernet-to-the-Factory Architecture
Enterprise Zone
Demilitarized Zone
Manufacturing Zone
1-17
Figure 1-1 shows the EttF architecture.
Topology Options
Cell NetworkTrunk-Drop Topology
Cell NetworkRing Topology
Cell NetworkRedundant-Star Topology
Where to Go Next
Page
Using the Command-Line Interface
Information About Using the Command-Line Interface
Command Modes
Page
Help System
Understanding Abbreviated Commands
No and default Forms of Commands
CLI Error Messages
Configuration Logging
How to Use the CLI to Configure Features
Configuring the Command History
Changing the Command History Buffer Size
Recalling Commands
Disabling the Command History Feature
Using Editing Features
Enabling and Disabling Editing Features
Editing Commands Through Keystrokes
Page
Editing Command Lines That Wrap
Searching and Filtering Output of show and more Commands
Accessing the CLI
Accessing the CLI through a Console Connection or through Telnet
Configuring Switch Alarms
Finding Feature Information
Information About Switch Alarms
Global Status Monitoring Alarms
FCS Error Hysteresis Threshold
Port Status Monitoring Alarms
Triggering Alarm Options
External Alarms
Default Switch Alarm Settings
How to Configure Switch Alarms
Configuring External Alarms
Configuring the Power Supply Alarms
Configuring the Switch Temperature Alarms
Associating the Temperature Alarms to a Relay
Configuring the FCS Bit Error Rate Alarm
Setting the FCS Error Threshold
Setting the FCS Error Hysteresis Threshold
Configuring Alarm Profiles
Creating an Alarm Profile
Modifying an Alarm Profile
Attaching an Alarm Profile to a Specific Port
Monitoring and Maintaining Switch Alarms Status
Enabling SNMP Traps
Configuration Examples for Switch Alarms
Configuring External Alarms: Example
Associating Temperature Alarms to a Relay: Examples
Creating or Modifying an Alarm Profile: Example
3-11
Setting the FCS Error Hysteresis Threshold: Example
This example shows how to set the FCS bit error rate for a port to 10-10:
Configuring a Dual Power Supply: Examples
This example shows how to configure two power supplies:
Displaying Alarm Settings: Example
Page
Page
Page
Performing Switch Setup Configuration
Restrictions for Performing Switch Setup Configuration
Information About Performing Switch Setup Configuration
Switch Boot Process
Page
Default Switch Boot Settings
Switch Boot Optimization
Switch Information Assignment
Switch Default Settings
DHCP-Based Autoconfiguration Overview
DHCP Client Request Process
DHCP-Based Autoconfiguration and Image Update
DHCP Autoconfiguration
DHCP Auto-Image Update
DHCP Server Configuration Guidelines
TFTP Server
DNS Server
Relay Device
How to Obtain Configuration Files
How to Control Environment Variables
Common Environment Variables
Scheduled Reload of the Software Image
How to Perform Switch Setup Configuration
Configuring DHCP Autoconfiguration (Only Configuration File)
Configuring DHCP Auto-Image Update (Configuration File and Image)
Configuring the Client
Manually Assigning IP Information on a Routed Port
Manually Assigning IP Information to SVIs
Modifying the Startup Configuration
Specifying the Filename to Read and Write the System Configuration
Manually Booting the Switch
Booting a Specific Software Image
Monitoring Switch Setup Configuration
Verifying the Switch Running Configuration
Configuration Examples for Performing Switch Setup Configuration
Retrieving IP Information Using DHCP-Based Autoconfiguration: Example
Page
4-20
DHCP Client Configuration No configuration file is present on Switch A through Switch D.
Scheduling Software Image Reload: Examples
This example shows how to reload the software on the switch on the current day at 7:30 p.m:
This example shows how to reload the software on the switch at a future time:
To cancel a previously scheduled reload, use the reload cancel privileged EXEC command.
Configuring DHCP Auto-Image Update: Example
Configuring Client to Download Files from DHCP Server
Page
Configuring Cisco IOS Configuration Engine
Prerequisites for Configuring Cisco IOS Configuration Engine
Information About Configuring Cisco IOS Configuration
Engine
Configuration Service
Event Service
NameSpace Mapper
CNS IDs and Device Hostnames
ConfigID
DeviceID
Hostname and DeviceID Interaction
Cisco IOS Agents
Initial Configuration
Incremental (Partial) Configuration
Synchronized Configuration
V
How to Configure Cisco IOS Configuration Engine Configuring Cisco IOS Agents
Enabling CNS Event Agent
Enabling Cisco IOS CNS Agent and an Initial Configuration
Page
Enabling a Partial Configuration
Monitoring and Maintaining Cisco IOS Configuration Engine
Configuration Examples for Cisco IOS Configuration Engine
Enabling the CNS Event Agent: Example
Configuring an Initial CNS Configuration: Examples
Page
Page
Page
Configuring Switch Clusters
Finding Feature Information
Prerequisites for Configuring Switch Clusters
Cluster Command Switch Characteristics
Standby Cluster Command Switch Characteristics
Candidate Switch and Cluster Member Switch Characteristics
Restrictions for Configuring Switch Clusters
Information About Configuring Switch Clusters
Benefits of Clustering Switches
Eligible Cluster Switches
How to Plan for Switch Clustering
Automatic Discovery of Cluster Candidates and Members
Discovery Through CDP Hops
6-6
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices
Discovery Through Different VLANs
Discovery Through Different Management VLANs
Discovery Through Routed Ports
Discovery of Newly Installed Switches
IP Addresses
Hostnames
Passwords
SNMP Community Strings
TACACS+ and RADIUS
LRE Profiles
Managing Switch Clusters
Using the CLI to Manage Switch Clusters
Using SNMP to Manage Switch Clusters
Page
Page
Performing Switch Administration
Finding Feature Information
Information About Performing Switch Administration
System Time and Date Management
System Clock
Network Time Protocol
NTP Version 4
DNS
Default DNS Configuration
Login Banners
System Name and Prompt
MAC Address Table
Address Table
MAC Addresses and VLANs
Default MAC Address Table Configuration
Address Aging Time for VLANs
MAC Address Change Notification Traps
Static Addresses
Unicast MAC Address Filtering
MAC Address Learning on a VLAN
ARP Table Management
How to Perform Switch Administration
Configuring Time and Date Manually
Setting the System Clock
Configuring the Time Zone
Configuring Summer Time (Daylight Saving Time)
Configuring Summer Time (Exact Date and Time)
Configuring a System Name
Setting Up DNS
Configuring Login Banners
Configuring a Message-of-the-Day Login Banner
Configuring a Login Banner
Managing the MAC Address Table
Changing the Address Aging Time
Configuring MAC Address Change Notification Traps
Configuring MAC Address Move Notification Traps
Configuring MAC Threshold Notification Traps
Page
Adding and Removing Static Address Entries
Configuring Unicast MAC Address Filtering
Disabling MAC Address Learning on a VLAN
Monitoring and Maintaining Switch Administration
Configuration Examples for Performing Switch Admininistration
Setting the System Clock: Example
Configuring Summer Time: Examples
Configuring a MOTD Banner: Examples
Configuring a Login Banner: Example
Configuring MAC Address Change Notification Traps: Example
Sending MAC Address Move Notification Traps: Example
Configuring MAC Threshold Notification Traps: Example
Adding the Static Address to the MAC Address Table: Example
Configuring Unicast MAC Address Filtering: Example
Page
Page
Configuring PTP
Finding Feature Information
Prerequisites for Configuring PTP
Restrictions for Configuring PTP
Information About Configuring PTP
How to Configure PTP
Default PTP Settings
Setting Up PTP
Monitoring and Maintaining the PTP Configuration
Troubleshooting the PTP Configuration
Page
Page
Configuring PROFINET
Finding Feature Information
Restrictions for Configuring PROFINET
Information About Configuring PROFINET
PROFINET Device Roles
PROFINET Device Data Exchange
Page
How to Configure PROFINET
Configuring PROFINET
Default Configuration
Enabling PROFINET
Monitoring and Maintaining PROFINET Troubleshooting PROFINET
Page
Configuring CIP
Finding Feature Information
Restrictions for Configuring CIP
Information About Configuring CIP
How to Configure CIP
Monitoring CIP Troubleshooting CIP
Page
Page
Configuring SDM Templates
Finding Feature Information
Prerequisites for Configuring SDM Templates
Restrictions for Configuring SDM Templates
Information About Configuring SDM Templates
Page
Dual IPv4 and IPv6 SDM Default Template
How to Configure the Switch SDM Templates
Setting the SDM Template
Monitoring and Maintaining SDM Templates
11-5
This is an example of output from the show sdm prefer dual-ipv4-and-ipv6 default command:
Configuration Examples for Configuring SDM Templates
Configuring the IPv4-and-IPv6 Default Template: Example
This example shows how to configure the IPv4-and-IPv6 default template on a desktop switch:
Page
Configuring Switch-Based Authentication
Finding Feature Information
Prerequisites for Configuring Switch-Based Authentication
Restrictions for Configuring Switch-Based Authentication
Information About Configuring Switch-Based Authentication
Prevention for Unauthorized Switch Access
Password Protection
Default Password and Privilege Level Configuration
Enable Secret Passwords with Encryption
Password Recovery
Telnet Password for a Terminal Line
Username and Password Pairs
Multiple Privilege Levels
Switch Access with TACACS+
TACACS+
TACACS+ Operation
Default TACACS+ Configuration
TACACS+ Server Host and the Authentication Key
TACACS+ Login Authentication
TACACS+ Authorization for Privileged EXEC Access and Network Services
TACACS+ Accounting
Switch Access with RADIUS
RADIUS
RADIUS Operation
Default RADIUS Configuration
RADIUS Change of Authorization
Radius COA Overview
Change-of-Authorization Requests
CoA Request Response Code
CoA Session Identification
CoA ACK Response Code
CoA NAK Response Code
CoA Request Commands
CoA Session Reauthentication
CoA Session Termination
CoA Disconnect-Request
CoA Request: Disable Host Port
CoA Request: Bounce-Port
RADIUS Server Host
RADIUS Login Authentication
Radius Method List
AAA Server Groups
RADIUS Authorization for User Privileged Access and Network Services
RADIUS Accounting
Establishing a Session with a Router if the AAA Server is Unreachable
Vendor-Specific RADIUS Attributes
Vendor-Proprietary RADIUS Server Communication
Switch Access with Kerberos
Understanding Kerberos
Page
Kerberos Operation
Authenticating to a Boundary Switch
Obtaining a TGT from a KDC
Authenticating to Network Services
Kerberos Configuration
Local Authentication and Authorization
Secure Shell
SSH
SSH Servers, Integrated Clients, and Supported Versions
Limitations
SSH Configuration Guidelines
Switch for Secure Socket Layer HTTP
Secure HTTP Servers and Clients
Default SSL Settings
Certificate Authority Trustpoints
CipherSuites
Secure Copy Protocol
Page
How to Configure Switch-Based Authentication
Configuring Password Protection
Setting or Changing a Static Enable Password
Protecting Enable and Enable Secret Passwords with Encryption
Disabling Password Recovery
Setting a Telnet Password for a Terminal Line
Configuring Username and Password Pairs
Setting the Privilege Level for a Command
Changing the Default Privilege Level for Lines
Logging Into and Exiting a Privilege Level
Configuring TACACS+
Identifying the TACACS+ Server Host and Setting the Authentication Key
Configuring TACACS+ Login Authentication
Page
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
Starting TACACS+ Accounting
Configuring Radius Server Communication
Page
Defining AAA Server Groups
Configuring RADIUS Login Authentication
Configuring RADIUS Authorization for User Privileged Access and Network Services
Starting RADIUS Accounting
Configuring Settings for All RADIUS Servers
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
Configuring CoA on the Switch
Configuring the Switch for Local Authentication and Authorization
Configuring Secure Shell
Setting Up the Switch to Run SSH
Configuring the SSH Server
Page
Configuring Secure HTTP Servers and Clients
Configuring a CA Trustpoint
Configuring the Secure HTTP Server
Page
Configuring the Secure HTTP Client
Monitoring and Maintaining Switch-Based Authentication
Configuration Examples for Configuring Switch-Based Authentication
Changing the Enable Password: Example
Configuring the Encrypted Password: Example
Setting the Telnet Password for a Terminal Line: Example
Setting the Privilege Level for a Command: Example
Defining AAA Server Groups: Example
Configuring Vendor-Specific RADIUS Attributes: Examples
Configuring a Vendor-Proprietary RADIUS Host: Example
Sample Output for a Self-Signed Certificate: Example
Verifying Secure HTTP Connection: Example
Page
Configuring IEEE 802.1x Port-Based Authentication
Device Roles
13-3
Authentication Process
access to the network.
If 802.1x authentication times out while waiting for an EAPO L message exchange and MAC
If the switch gets an invalid identity from an 802.1x-capable client and a restricted VLAN is
specified, the switch can assign the client to a restricted VLAN that provides limited services.
Switch-to-RADIUS-Server Communication
Authentication Initiation and Message Exchange
Page
Authentication Manager
Port-Based Authentication Methods
Per-User ACLs and Filter-Ids
Authentication Manager CLI Commands
Ports in Authorized and Unauthorized States
802.1x Host Mode
Multidomain Authentication
802.1x Multiple Authentication Mode
MAC Move
MAC Replace
802.1x Accounting
802.1x Accounting Attribute-Value Pairs
802.1x Readiness Check
802.1x Authentication with VLAN Assignment
Voice Aware 802.1x Security
802.1x Authentication with Per-User ACLs
802.1x Authentication with Downloadable ACLs and Redirect URLs
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL
Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs
VLAN ID-Based MAC Authentication
802.1x Authentication with Guest VLAN
802.1x Authentication with Restricted VLAN
802.1x Authentication with Inaccessible Authentication Bypass
Support on Multiple-Authentication Ports
Authentication Results
Feature Interactions
802.1x Authentication with Voice VLAN Ports
802.1x Authentication with Port Security
802.1x Authentication with Wake-on-LAN
802.1x Authentication with MAC Authentication Bypass
802.1x User Distribution
802.1x User Distribution Configuration Guidelines
Network Admission Control Layer 2 802.1x Validation
Flexible Authentication Ordering
Open1x Authentication
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT)
802.1x Supplicant and Authenticator Switch Guidelines
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute
4
1
2 3 5
Authentication Manager Common Session ID
Default 802.1x Authentication Settings
802.1x Accounting
802.1x Authentication Guidelines
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass Guidelines
MAC Authentication Bypass Guidelines
Maximum Number of Allowed Devices Per Port Guidelines
How to Configure IEEE 802.1x Port-Based Authentication
802.1x Authentication Configuration Process
Page
Configuring the Switch-to-RADIUS-Server Communication
Configuring 802.1x Readiness Check
Enabling Voice Aware 802.1x Security
Configuring 802.1x Violation Modes
Configuring the Host Mode
Configuring Periodic Reauthentication
Configuring Optional 802.1x Authentication Features
Page
Configuring 802.1x Accounting
Configuring a Guest VLAN
Configuring a Restricted VLAN
Configuring the Maximum Number of Authentication Attempts
Configuring Inaccessible Authentication Bypass
Page
Configuring 802.1x User Distribution
Configuring NAC Layer 2 802.1x Validation
Configuring an Authenticator and Supplicant
Configuring an Authenticator
Configuring a Supplicant Switch with NEAT
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs
Configuring Downloadable ACLs
Configuring a Downloadable Policy
Configuring Open1x
Resetting the 802.1x Authentication Configuration to the Default Values
Monitoring and Maintaining IEEE 802.1x Port-Based
Authentication
Configuration Examples for Configuring IEEE 802.1x
Port-Based Authentication
Enabling a Readiness Check: Example
Enabling 802.1x Authentication: Example
Enabling MDA: Example
Disabling the VLAN Upon Switch Violoation: Example
Configuring the Radius Server Parameters: Example
Configuring 802.1x Accounting: Example
Enabling an 802.1x Guest VLAN: Example
Displaying Authentication Manager Common Session ID: Examples
Configuring Inaccessible Authentication Bypass: Example
Configuring VLAN Groups: Examples
Configuring NAC Layer 2 802.1x Validation: Example
Configuring an 802.1x Authenticator Switch: Example
13-55
Configuring an 802.1x Supplicant Switch: Example
This example shows how to configure a switch as a supplicant:
Configuring a Downloadable Policy: Example
This example shows how to configure a switch for a downloadable policy:
Configuring Open 1x on a Port: Example
Page
Page
Page
Configuring Web-Based Authentication
Finding Feature Information
Prerequisites for Configuring Web-Based Authentication
Restrictions for Configuring Web-Based Authentication on the IE 2000 Switch
Information About Configuring Web-Based Authentication
Web-Based Authentication
Device Roles
Host Detection
Session Creation
Authentication Process
Local Web Authentication Banner
Page
Web Authentication Customizable Web Pages
Web Authentication Guidelines
Page
Web-Based Authentication Interactions with Other Features
Port Security
LAN Port IP
Gateway IP
ACLs
Context-Based Access Control
802.1x Authentication
EtherChannel
Default Web-Based Authentication Settings
Configuring Switch-to-RADIUS-Server Communication
How to Configure Web-Based Authentication
Configuring the Authentication Rule and Interfaces
Configuring AAA Authentication
Configuring Switch-to-RADIUS-Server Communication
Configuring the HTTP Server
Customizing the Authentication Proxy Web Pages
Specifying a Redirection URL for Successful Login
Configuring the Web-Based Authentication Parameters
Configuring a Web Authentication Local Banner
Removing Web-Based Authentication Cache Entries
Enabling and Displaying Web-Based Authentication: Examples
14-15
This example shows how to verify the configuration:
Enabling AAA: Example
This example shows how to enable AAA:
Configuring the RADIUS Server Parameters: Example
This example shows how to configure the RADIUS server parameters on a switch:
Configuring a Custom Authentication Proxy Web Page: Example
Configuring a Redirection URL: Example
This example shows how to configure a redirection URL for successful login:
Verifying a Redirection URL: Example
This example shows how to verify the redirection URL for successful login:
Configuring a Local Banner: Example
Page
Page
Configuring Interface Characteristics
Finding Feature Information
Restrictions for Configuring Interface Characteristics
Information About Configuring Interface Characteristics
Interface Types
Port-Based VLANs
Switch Ports
Routed Ports
Access Ports
Trunk Ports
EtherChannel Port Groups
Dual-Purpose Uplink Ports
Connecting Interfaces
Using Interface Configuration Mode
Page
Default Ethernet Interface Settings
Interface Speed and Duplex Mode
Speed and Duplex Configuration Guidelines
IEEE 802.3x Flow Control
Auto-MDIX on an Interface
SVI Autostate Exclude
System MTU
How to Configure Interface Characteristics
Configuring Layer 3 Interfaces
Page
Configuring Interfaces
Configuring a Range of Interfaces
Interface Range Restrictions
Configuring and Using Interface Range Macros
Configuring Ethernet Interfaces
Setting the Type of a Dual-Purpose Uplink Port
Setting the Interface Speed and Duplex Parameters
Configuring IEEE 802.3x Flow Control
Configuring Auto-MDIX on an Interface
Adding a Description for an Interface
Configuring SVI Autostate Exclude
Configuring the System MTU
Monitoring and Maintaining Interface Characteristics
Monitoring Interface Status
Clearing and Resetting Interfaces and Counters
Shutting Down and Restarting the Interface
Configuration Examples for Configuring Interface Characteristics
Configuring the Interface Range: Examples
Configuring Interface Range Macros: Examples
Setting Speed and Duplex Parameters: Example
Enabling auto-MDIX: Example
Adding a Description on a Port: Example
Configuring SVI Autostate Exclude: Example
Page
Page
Configuring Smartports Macros
Finding Feature Information
Information About Configuring Smartports Macros
How to Configure Smartports Macros
Default Smartports Settings
Smartports Configuration Guidelines
Applying Smartports Macros
Monitoring and Maintaining Smartports Macros
Configuration Examples for Smartports Macros
Applying the Smartports Macro: Examples
Page
Page
Configuring VLANs
Finding Feature Information
Information About Configuring VLANs VLANs
Supported VLANs
VLAN Port Membership Modes
Normal-Range VLANs
Token Ring VLANs
Normal-Range VLAN Configuration Guidelines
Default Ethernet VLAN Configuration
Ethernet VLANs
VLAN Removal
Static-Access Ports for a VLAN
Extended-Range VLANs
Default VLAN Configuration
Extended-Range VLAN Configuration Guidelines
VLAN Trunks
Trunking Overview
IEEE 802.1Q Configuration Guidelines
Default Layer 2 Ethernet Interface VLAN Settings
Ethernet Interface as a Trunk Port
Trunking Interaction with Other Features
Allowed VLANs on a Trunk
Native VLAN for Untagged Traffic
Load Sharing Using Trunk Ports
Load Sharing Using STP Port Priorities
Load Sharing Using STP Path Cost
VMPS
Dynamic-Access Port VLAN Membership
Default VMPS Client Settings
VMPS Configuration Guidelines
VMPS Reconfirmation Interval
Dynamic-Access Port VLAN Membership
How to Configure VLANs
Creating or Modifying an Ethernet VLAN
Deleting a VLAN Assigning Static-Access Ports to a VLAN
Creating an Extended-Range VLAN
Creating an Extended-Range VLAN with an Internal VLAN ID
Configuring an Ethernet Interface as a Trunk Port
Defining the Allowed VLANs on a Trunk
Changing the Pruning-Eligible List
Configuring the Native VLAN for Untagged Traffic
Load Sharing Using STP Port Priorities
Configuring Load Sharing Using STP Path Cost
Configuring the VMPS Client
Entering the IP Address of the VMPS
Configuring Dynamic-Access Ports on VMPS Clients
Monitoring and Maintaining VLANs
17-24
Configuration Examples for Configuring VLANs
VMPS Network: Example
Configuring a VLAN: Example
Configuring an Access Port in a VLAN: Example
Configuring an Extended-Range VLAN: Example
Configuring a Trunk Port: Example
Removing a VLAN: Example
Page
Configuring VTP
Finding VTP Feature Information
Prerequisites for Configuring VTP
Restrictions for Configuring VTP
Information About Configuring VTP
VTP
VTP Domain
VTP Modes
VTP Mode Guidelines
VTP Advertisements
VTP Version 2
VTP Version 3
VTP Version Guidelines
VTP Pruning
Page
Default VTP Settings
VTP Configuration Guidelines
Domain Names
Passwords
Adding a VTP Client Switch to a VTP Domain
How to Configure VTP
Configuring VTP Domain and Parameters
Configuring a VTP Version 3 Password
Enabling the VTP Version
Enabling VTP Pruning
Configuring VTP on a Per-Port Basis
Adding a VTP Client Switch to a VTP Domain
Monitoring and Maintaining VTP
Configuration Examples for Configuring VTP
Configuring a VTP Server: Example
Configuring a Hidden VTP Password: Example
Configuring a VTP Version 3 Primary Server: Example
Additional References for Configuring VTP
Page
Configuring Voice VLAN
Information About Configuring Voice VLAN
Voice VLAN
Cisco IP Phone Voice Traffic
Cisco IP Phone Data Traffic
Default Voice VLAN Configuration
Voice VLAN Configuration Guidelines
Port Connection to a Cisco 7960 IP Phone
Priority of Incoming Data Frames
How to Configure VTP
Configuring Cisco IP Phone for Voice Traffic
Configuring the Priority of Incoming Data Frames
Monitoring and Maintaining Voice VLAN Configuration Examples for Configuring Voice VLAN
Configuring a Cisco IP Phone for Voice Traffic: Example
Configuring the Cisco IP Phone Priority of Incoming Data Frames: Example
Additional References for Configuring Voice VLAN
Page
Page
Configuring STP
Finding Feature Information
Prerequisites for Configuring STP
Restrictions for Configuring STP
Information About Configuring STP
STP
Spanning-Tree Topology and BPDUs
Bridge ID, Switch Priority, and Extended System ID
Spanning-Tree Interface States
Blocking State
Listening State
Learning State
Forwarding State
Disabled State
How a Switch or Port Becomes the Root Switch or Root Port
Spanning Tree and Redundant Connectivity
Spanning-Tree Address Management
Accelerated Aging to Retain Connectivity
Spanning-Tree Modes and Protocols
Supported Spanning-Tree Instances
Spanning-Tree Interoperability and Backward Compatibility
STP and IEEE 802.1Q Trunks
VLAN-Bridge Spanning Tree
Default Spanning-Tree Settings
Disabling Spanning Tree
Root Switch
Secondary Root Switch
Port Priority
Path Cost
Spanning-Tree Timers
Spanning-Tree Configuration Guidelines
How to Configure STP
Changing the Spanning-Tree Mode
Configuring the Root Switch
Configuring a Secondary Root Switch
Configuring Port Priority
Configuring Path Cost
Configuring Optional STP Parameters
Monitoring and Maintaining STP
Page
Configuring MSTP
Information About Configuring MSTP
MSTP
Multiple Spanning-Tree Regions
IST, CIST, and CST
Operations Within an MST Region
Operations Between MST Regions
IEEE 802.1s Terminology
Hop Count
Boundary Ports
IEEE 802.1s Implementation
Port Role Naming Change
Interoperation Between Legacy and Standard Switches
Detecting Unidirectional Link Failure
Interoperability with IEEE 802.1D STP
RSTP
Port Roles and the Active Topology
Rapid Convergence
Synchronization of Port Roles
Bridge Protocol Data Unit Format and Processing
Processing Superior BPDU Information
Processing Inferior BPDU Information
Topology Changes
Default MSTP Settings
MSTP Configuration Guidelines
Root Switch
Secondary Root Switch
Port Priority
Path Cost
Link Type to Ensure Rapid Transitions
Neighbor Type
How to Configure MSTP
Specifying the MST Region Configuration and Enabling MSTP
Configuring the Root Switch
Configuring the Optional MSTP Parameters
Page
Monitoring and Maintaining MSTP
Configuration Examples for Configuring MSTP
Configuring the MST Region: Example
Page
Page
Configuring Optional Spanning-Tree Features
BPDU Guard
BPDU Filtering
UplinkFast
Page
BackboneFast
Page
EtherChannel Guard
Root Guard
Loop Guard
Default Optional Spanning-Tree Settings
How to Configure the Optional Spanning-Tree Features
Enabling Optional SPT Features
Maintaining and Monitoring Optional Spanning-Tree Features
Page
Page
Configuring Resilient Ethernet Protocol
Finding Feature Information
Prerequisites for REP
Restrictions for REP
Information About Configuring REP
Page
Page
Link Integrity
Fast Convergence
VLAN Load Balancing
Page
Spanning Tree Interaction
REP Ports
REP Segments
Default REP Configuration
REP Configuration Guidelines
REP Administrative VLAN
How to Configure REP
Configuring the REP Administrative VLAN
Configuring REP Interfaces
Page
Page
Setting Manual Preemption for VLAN Load Balancing
Monitoring and Maintaining REP
Configuring SNMP Traps for REP
23-13
Configuration Examples for Configuring REP
Configuring the Administrative VLAN: Example
Configuring a Primary Edge Port: Examples
Configuring VLAN Blocking: Example
Page
Page
Configuring FlexLinks and the MAC Address-Table Move Update
Restrictions for the FlexLinks and the MAC Address-Table Move Update
Information About Configuring the FlexLinks and the MAC Address-Table Move Update
FlexLinks
VLAN FlexLinks Load Balancing and Support
FlexLinks Multicast Fast Convergence
Learning the Other FlexLinks Port as the mrouter Port
Generating IGMP Reports
Leaking IGMP Reports
MAC Address-Table Move Update
Default Settings for FlexLinks and MAC Address-Table Move Update
Configuration Guidelines for FlexLinks and MAC Address-Table Move Update
How to Configure the FlexLinks and MAC Address-Table Move Update
Configuring FlexLinks
Configuring a Preemption Scheme for FlexLinks
Configuring VLAN Load Balancing on FlexLinks
Configuring the MAC Address-Table Move Update Feature
Configuring the MAC Address-Table Move Update Messages
Maintaining and Monitoring the FlexLinks and MAC Address-Table Move Update
Configuration Examples for the FlexLinks and MAC Address-Table Move Update
Configuring FlexLinks Port: Examples
Page
Configuring a Backup Interface: Example
Configuring a Preemption Scheme: Example
Configuring VLAN Load Balancing on FlexLinks: Examples
Configuring MAC Address-Table Move Update: Example
Page
Configuring DHCP
Information About Configuring DHCP
DHCP Snooping
DHCP Server
DHCP Relay Agent
DHCP Snooping
Option-82 Data Insertion
Page
Circuit ID Suboption Frame Format
Remote ID Suboption Frame Format
Cisco IOS DHCP Server Database
DHCP Snooping Binding Database
Circuit ID Suboption Frame Format (for user-configured string):
Remote ID Suboption Frame Format (for user-configured string):
Default DHCP Snooping Settings
DHCP Snooping Configuration Guidelines
DHCP Snooping Binding Database Guidelines
Packet Forwarding Address
DHCP Server Port-Based Address Allocation
How to Configure DHCP
Configuring the DHCP Relay Agent
Specifying the Packet Forwarding Address
Enabling DHCP Snooping and Option 82
Enabling the DHCP Snooping Binding Database Agent
Enabling DHCP Server Port-Based Address Allocation
Preassigning an IP Address
Monitoring and Maintaining DHCP
25-15
Configuration Examples for Configuring DHCP
Enabling DHCP Server Port-Based Address Allocation: Examples
This example shows that the preassigned address was correctly reserved in the DHCP pool:
Enabling DHCP Snooping: Example
Page
Configuring Dynamic ARP Inspection
Prerequisites for Dynamic ARP Inspection
Restrictions for Dynamic ARP Inspection
Information About Dynamic ARP Inspection
Dynamic ARP Inspection
Page
Interface Trust States and Network Security
Rate Limiting of ARP Packets
Relative Priority of ARP ACLs and DHCP Snooping Entries
Logging of Dropped Packets
Default Dynamic ARP Inspection Settings
Dynamic ARP Inspection Configuration Guidelines
How to Configure Dynamic ARP Inspection
Configuring Dynamic ARP Inspection in DHCP Environments
Configuring ARP ACLs for Non-DHCP Environments
Page
Limiting the Rate of Incoming ARP Packets
Performing Validation Checks
Configuring the Log Buffer
Monitoring and Maintaining Dynamic ARP Inspection
Configuration Examples for Dynamic ARP Inspection
Configuring Dynamic ARP Inspection in DHCP Environments: Example
Configuring ARP ACLs for Non-DHCP Environments: Example
Page
Page
Configuring IP Source Guard
Prerequisites for IP Source Guard
Restrictions for IP Source Guard
Information About IP Source Guard
IP Source Guard
Source IP Address Filtering
Source IP and MAC Address Filtering
IP Source Guard for Static Hosts
IP Source Guard Configuration Guidelines
How to Configure IP Source Guard
Enabling IP Source Guard
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port
Page
Monitoring and Maintaining IP Source Guard Configuration Examples for IP Source Guard
Enabling IPSG with Source IP and MAC Filtering: Example
Disabling IPSG with Static Hosts: Example
Enabling IPSG for Static Hosts: Examples
27-8
Displaying IP or MAC Binding Entries: Examples
27-9
This example displays all active IP or MAC binding entries for all interfaces:
This example displays the count of all IP device tracking host entries for all interfaces:
Enabling IPSG for Static Hosts: Examples
This example shows how to enable IPSG for static hosts with IP filters on a private VLAN host port:
27-10
The output shows that the five valid IP-MAC bindings are on both the primary and sec ondary VLAN.
The following sections provide references related to switch administration:
Page
Page
Configuring IGMP Snooping and MVR
Restrictions for IGMP Snooping and MVR
Information About IGMP Snooping and MVR
IGMP Snooping
IGMP Versions
Joining a Multicast Group
Page
Leaving a Multicast Group
Immediate Leave
IGMP Configurable-Leave Timer
IGMP Report Suppression
Default IGMP Snooping Configuration
Snooping Methods
Multicast Flooding Time After a TCN Event
Flood Mode for TCN
Multicast Flooding During a TCN Event
IGMP Snooping Querier Guidelines
IGMP Report Suppression
Multicast VLAN Registration
MVR in a Multicast Television Application
Page
Default MVR Settings
MVR Configuration Guidelines and Limitations
IGMP Filtering and Throttling
Default IGMP Filtering and Throttling Configuration
IGMP Profiles
IGMP Throttling Action
How to Configure IGMP Snooping and MVR
Configuring IGMP Snooping
Setting IGMP Snooping Parameters
Enabling or Disabling IGMP Snooping
Configuring TCN
Configuring the IGMP Snooping Querier
Disabling IGMP Report Suppression
Configuring MVR
Configuring MVR Global Parameters
Configuring MVR Interfaces
Configuring IGMP
Configuring IGMP Profiles
Configuring IGMP Interfaces
Monitoring and Maintaining IGMP Snooping and MVR
Page
Configuration Examples for IGMP Snooping
Configuring IGMP Snooping: Example
Disabling a Multicast Router Port: Example
Statically Configuring a Host on a Port: Example
Enabling IGMP Immediate Leave: Example
Enabling MVR: Examples
Creating an IGMP Profile: Example
Applying an IGMP Profile: Example
Limiting IGMP Groups: Example
Page
Configuring Port-Based Traffic Control
Restrictions for Port-Based Traffic Control
Information About Port-Based Traffic Control
Storm Control
Default Storm Control Configuration
Storm Control and Threshold Levels
Small-Frame Arrival Rate
Protected Ports
Protected Port Configuration Guidelines
Port Blocking
Port Security
Secure MAC Addresses
Security Violations
Default Port Security Configuration
Port Security Configuration Guidelines
Page
Port Security Aging
Port Security and Private VLANs
Protocol Storm Protection
How to Configure Port-Based Traffic Control
Configuring Storm Control
Configuring Storm Control and Threshold Levels
Configuring Small-Frame Arrival Rate
Configuring Protected Ports
Configuring Port Blocking
Blocking Flooded Traffic on an Interface
Configuring Port Security Enabling and Configuring Port Security
Page
Page
Page
Enabling and Configuring Port Security Aging
Configuring Protocol Storm Protection
Enabling Protocol Storm Protection
Monitoring and Maintaining Port-Based Traffic Control
Configuration Examples for Port-Based Traffic Control
Enabling Unicast Storm Control: Example
Enabling Broadcast Address Storm Control on a Port: Example
Enabling Small-Frame Arrival Rate: Example
Configuring a Protected Port: Example
Blocking Flooding on a Port: Example
Configuring Port Security: Examples
Configuring Port Security Aging: Examples
Configuring Protocol Storm Protection: Example
Page
Page
Configuring SPAN and RSPAN
Prerequisites for SPAN and RSPAN
Restrictions for SPAN and RSPAN
Information About SPAN and RSPAN
SPAN and RSPAN
Local SPAN
Remote SPAN
SPAN Sessions
Monitored Traffic Types for SPAN Sessions
Source Ports
Source VLANs
VLAN Filtering
Destination Port
RSPAN VLAN
SPAN and RSPAN Interaction with Other Features
Local SPAN Configuration Guidelines
RSPAN Configuration Guidelines
Default SPAN and RSPAN Settings
How to Configure SPAN and RSPAN
Creating a Local SPAN Session
Page
Creating a Local SPAN Session and Configuring Incoming Traffic
Specifying VLANs to Filter
Configuring a VLAN as an RSPAN VLAN
Creating an RSPAN Source Session
Creating an RSPAN Destination Session
Creating an RSPAN Destination Session and Configuring Incoming Traffic
Specifying VLANs to Filter
Monitoring and Maintaining SPAN and RSPAN Configuration Examples for SPAN and RSPAN
Configuring a Local SPAN Session: Example
Modifying Local SPAN Sessions: Examples
Configuring an RSPAN: Example
Configuring a VLAN for a SPAN Session: Example
Modifying RSPAN Sessions: Examples
Page
Page
Configuring LLDP, LLDP-MED, and Wired Location Service
Restrictions for LLDP, LLDP-MED, and Wired Location Service
Information About LLDP, LLDP-MED, and Wired Location Service
LLDP-MED
Wired Location Service
Default LLDP Configuration
LLDP, LLDP-MED, and Wired Location Service Configuration Guidelines
LLDP-MED TLVs
How to Configure LLDP, LLDP-MED, and Wired Location Service
Enabling LLDP
Configuring LLDP Characteristics
Configuring LLDP-MED TLVs
Configuring Network-Policy TLV
Configuring Location TLV and Wired Location Service
Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service
Configuration Examples for Configuring LLDP, LLDP-MED, and Wired Location Service
Enabling LLDP: Examples
Configuring LDP Parameters: Examples
Configuring TLV: Example
Configuring Network Policy: Example
Configuring Voice Application: Example
Configuring Civic Location Information: Example
Enabling NMSP: Example
Page
Page
Configuring CDP
Finding Feature Information
Information About CDP
CDP
Default CDP Configuration
How to Configure CDP
Configuring the CDP Parameters
Disabling CDP
Monitoring and Maintaining CDP
Configuration Examples for CDP
Configuring CDP Parameters: Example
Enabling CDP: Examples
Page
Page
Configuring UDLD
Prerequisites for UDLD
Restrictions for UDLD
Information About UDLD
UDLD
Modes of Operation
Methods to Detect Unidirectional Links
Page
Default UDLD Settings
How to Configure UDLD
Enabling UDLD Globally
Enabling UDLD on an Interface
Setting and Resetting UDLD Parameters
Maintaining and Monitoring UDLD
Page
Page
Configuring RMON
Prerequisites for RMON
Restrictions for RMON
Information About RMON
RMON
Page
How to Configure RMON
Configuring RMON Alarms and Events
Collecting Group History Statistics on an Interface
Collecting Group Ethernet Statistics on an Interface
Monitoring and Maintaining RMON
Configuration Examples for RMON
Configuring an RMON Alarm Number: Example
Creating an RMON Event Number: Example
Configuring RMON Statistics: Example
Page
Page
Page
Configuring System Message Logging
Restrictions for System Message Logging
Information About System Message Logging
System Message Logging
System Log Message Format
Log Messages
Message Severity Levels
Configuring UNIX Syslog Servers
Logging Messages to a UNIX Syslog Daemon
Default System Message Logging Configuration
How to Configure System Message Logging
Disabling Message Logging
Setting the Message Display Destination Device
Synchronizing Log Messages
Enabling and Disabling Time Stamps on Log Messages
Enabling and Disabling Sequence Numbers in Log Messages
Defining the Message Severity Level
Limiting Syslog Messages Sent to the History Table and to SNMP
Enabling the Configuration-Change Logger
Configuring the UNIX System Logging Facility
Monitoring and Maintaining the System Message Log Configuration Examples for the System Message Log
System Message: Example
Logging Display: Examples
Enabling the Logger: Example
Configuration Log Output: Example
Page
Page
Page
Configuring SNMP
Prerequisites for SNMP
Restrictions for SNMP
Information About SNMP
SNMP
SNMP Versions
Page
SNMP Manager Functions
SNMP Agent Functions
SNMP Community Strings
Using SNMP to Access MIB Variables
SNMP Notifications
SNMP ifIndex MIB Object Values
Community Strings
SNMP Notifications
Page
Default SNMP Settings
How to Configure SNMP
Disabling the SNMP Agent
Configuring Community Strings
Configuring SNMP Groups and Users
Page
Configuring SNMP Notifications
Page
Setting the CPU Threshold Notification Types and Values
Setting the Agent Contact and Location Information
Limiting TFTP Servers Used Through SNMP
Monitoring and Maintaining SNMP
Configuration Examples for SNMP
Enabling SNMP Versions: Example
Permit SNMP Manager Access: Example
Allow Read-Only Access: Example
Configure SNMP Traps: Examples
Associating a User with a Remote Host: Example
Assigning a String to SNMP: Example
Page
Configuring Network Security with ACLs
Restrictions for Network Security with ACLs
Information About Network Security with ACLs
ACLs
Supported ACLs
Port ACLs
Handling Fragmented and Unfragmented Traffic
IPv4 ACLs
Standard and Extended IPv4 ACLs
Access List Numbers
ACL Logging
Numbered Extended ACL
Resequencing ACEs in an ACL
Named Standard and Extended ACLs
Time Ranges with ACLs
Comments in ACLs
IPv4 ACL to a Terminal Line
IPv4 ACL Application to an Interface Guidelines
Hardware and Software Handling of IP ACLs
Troubleshooting ACLs
Named MAC Extended ACLs
MAC ACL to a Layer 2 Interface
How to Configure Network Security with ACLs
Creating a Numbered Standard ACL
Page
Creating a Numbered Extended ACL
Page
Creating Named Standard and Extended ACLs
Using Time Ranges with ACLs
Applying an IPv4 ACL to a Terminal Line
Applying an IPv4 ACL to an Interface
Creating Named MAC Extended ACLs
Applying a MAC ACL to a Layer 2 Interface
Monitoring and Maintaining Network Security with ACLs
Configuration Examples for Network Security with ACLs
Creating a Standard ACL: Example
Creating an Extended ACL: Example
37-20
Configuring Time Ranges: Examples
Using Named ACLs: Example
This example uses named ACLs to permit and deny the same traffic.
Including Comments in ACLs: Examples
Applying ACL to a Port: Example
Applying an ACL to an Interface: Example
Routed ACLs: Examples
Configuring Numbered ACLs: Example
Configuring Extended ACLs: Examples
Creating Named ACLs: Example
Applying Time Range to an IP ACL: Example
Creating Commented IP ACL Entries: Examples
Configuring ACL Logging: Examples
Applying a MAC ACL to a Layer 2 Interface: Examples
Page
Page
Configuring Standard QoS
Prerequisites for Standard QoS
Restrictions for Standard QoS
Information About Standard QoS
Page
Standard QoS Model
Standard QoS Configuration Guidelines
QoS ACL
QoS on Interfaces
Policing
Default Standard QoS Configuration
Default Ingress Queue Settings
Default Egress Queue Settings
Default Mapping Table Settings
Page
Classification
Page
38-12
Classification Based on QoS ACLs
Classification Based on Class Maps and Policy Maps
Policing and Marking
Policing on Physical Ports
Policing on SVIs
Page
Mapping Tables
Queueing and Scheduling Overview
Weighted Tail Drop
SRR Shaping and Sharing
Queueing and Scheduling on Ingress Queues
WTD Thresholds
Buffer and Bandwidth Allocation
Priority Queueing
Queueing and Scheduling on Egress Queues
Page
Buffer and Memory Allocation
WTD Thresholds
Shaped or Shared Mode
Packet Modification
Classification Using Port Trust States
Trust State on Ports within the QoS Domain
Configuring a Trusted Boundary to Ensure Port Security
DSCP Transparency Mode
DSCP Trust State on a Port Bordering Another QoS Domain
QoS Policies
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps
DSCP Maps
DSCP-to-DSCP-Mutation Map
Ingress Queue Characteristics
Ingress Priority Queue
Egress Queue Characteristics
Egress Queue Configuration Guidelines
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
How to Configure Standard QoS
Enabling QoS Globally Enabling VLAN-Based QoS on Physical Ports
Configuring Classification Using Port Trust States
Configuring the Trust State on Ports Within the QoS Domain
Configuring the CoS Value for an Interface
Configuring a Trusted Boundary to Ensure Port Security
Enabling DSCP Transparency Mode
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain
Configuring a QoS Policy
Creating IP Standard ACLs
Creating IP Extended ACLs
Creating a Layer 2 MAC ACL for Non-IP Traffic
Creating Class Maps
Page
Creating Nonhierarchical Policy Maps
Page
Creating Hierarchical Policy Maps
Page
Page
Page
Creating Aggregate Policers
Configuring DSCP Maps
Configuring the CoS-to-DSCP Map
Configuring the IP-Precedence-to-DSCP Map
Configuring the Policed-DSCP Map
Configuring the DSCP-to-CoS Map
Configuring the DSCP-to-DSCP-Mutation Map
Configuring Ingress Queue Characteristics
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds
Allocating Buffer Space Between the Ingress Queues
Allocating Bandwidth Between the Ingress Queues
Configuring the Ingress Priority Queue
Configuring Egress Queue Characteristics
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID
Configuring SRR Shaped Weights on Egress Queues
Configuring SRR Shared Weights on Egress Queues
Configuring the Egress Expedite Queue
Monitoring and Maintaining Standard QoS
Limiting the Bandwidth on an Egress Interface
Configuration Examples for Standard QoS
Configuring the SRR Scheduler: Example
Configuring DSCP-Trusted State on a Port: Example
Allowing ACL Permission for IP Traffic: Examples
Configuring a Class Map: Examples
Creating a Policy Map: Example
Creating a Layer 2 MAC ACL: Example
Creating an Aggregate Policer: Example
Configuring COS-to-DSCP Map: Example
Configuring DSCP Maps: Examples
Configuring an Ingress Queue: Example
Configuring the Egress Queue: Examples
Creating a Layer 2 MAC ACL: Example
Page
Page
Page
Configuring Auto-QoS
Prerequisites for Auto-QoS
Restrictions for Auto-QoS
Information About Auto-QoS
Auto-QoS
Generated Auto-QoS Configuration
Page
39-5
The switch automatically maps CoS values to an egress queue and to a threshold ID.
The switch automatically maps DSCP values to an ingress queue and to a threshold ID.
The switch automatically maps DSCP values to an egress queue and to a threshold ID.
Table 39-4 Generated Auto-QoS Configuration (continued)
Page
Effects of Auto-QoS on the Configuration
How to Configure Auto-QoS
Enabling Auto-QoS for VoIP
Configuring QoS to Prioritize VoIP Traffic
Monitoring and Maintaining Auto-QoS
39-10
Configuration Examples for Auto-QoS
Auto-QoS Network: Example
Enabling Auto-QoS VOIP Trust: Example
Page
Configuring EtherChannels
Finding Feature Information
Restrictions for Configuring EtherChannels
Information About Configuring EtherChannels
EtherChannels
Port-Channel Interfaces
Port Aggregation Protocol
PAgP Modes
PAgP Learn Method and Priority
PAgP Interaction with Virtual Switches and Dual-Active Detection
PAgP Interaction with Other Features
Link Aggregation Control Protocol
LACP Modes
LACP Hot-Standby Ports
LACP Interaction with Other Features
EtherChannel On Mode
Load Balancing and Forwarding Methods
Page
Default EtherChannel Settings
EtherChannel Configuration Guidelines
How to Configure EtherChannels
Configuring Layer 2 EtherChannels
Page
Page
Configuring EtherChannel Load Balancing
Configuring the PAgP Learn Method and Priority
Configuring the LACP Hot-Standby Ports
Monitoring and Maintaining EtherChannels on the IE 2000 Switch
Configuration Examples for Configuring EtherChannels
Configuring EtherChannels: Examples
Additional References
Page
Page
Configuring Static IP Unicast Routing
Finding Feature Information
Restrictions for Static IP Unicast Routing
Information About Configuring Static IP Unicast Routing
IP Routing
Types of Routing
How to Configure Static IP Unicast Routing
Steps for Configuring Routing
Enabling IP Unicast Routing
Assigning IP Addresses to SVIs
Configuring Static Unicast Routes
Monitoring and Maintaining the IP Network
Additional References for Configuring IP Unicast Routing
Page
Configuring IPv6 Host Functions
Prerequisites Configuring IPv6 Host Functions
Information About Configuring IPv6 Host Functions
IPv6
IPv6 Addresses
Supported IPv6 Host Features
128-Bit Wide Unicast Addresses
DNS for IPv6
ICMPv6
Neighbor Discovery
Default Router Preference
IPv6 Stateless Autoconfiguration and Duplicate Address Detection
IPv6 Applications
Dual IPv4 and IPv6 Protocol Stacks
Static Routes for IPv6
SNMP and Syslog Over IPv6
HTTP over IPv6
Default IPv6 Settings
How to Configure IPv6 Hosting
Configuring IPv6 Addressing and Enabling IPv6 Host
Configuring Default Router Preference
Configuring IPv6 ICMP Rate Limiting
Monitoring and Maintaining IPv6 Host Information
42-10
Configuration Examples for IPv6 Host Functions
Enabling IPv6: Example
Configuring DRP: Example
This example shows how to configure a DRP of high for the router on an interface.
Configuring an IPv6 ICMP Error Message Interval
Displaying Show Command Output: Examples
This is an example of the output from the show ipv6 interfac e privileged EXEC command:
This is an example of the output from the show ipv6 protocols privileged EXEC command :
This is an example of the output from the show ipv6 neighbor privileged EXEC command:
This is an example of the output from the show ipv6 route privileged EXEC command:
42-12
Page
Page
Configuring Link State Tracking
Finding Feature Information
Restrictions for Configuring Link State Tracking
Information About Configuring Link State Tracking Link State Tracking
Page
43-3
Default Link State Tracking Configuration
There are no link state groups defined, and link state trac king is not enabled for any group.
How to Configure Link State Tracking
Configuring Link State Tracking
Displaying Link State Information: Examples
Creating a Link State Group: Example
Page
Configuring IPv6 MLD Snooping
Finding Feature Information
Prerequisites for Configuring IPv6 MLD Snooping
Restrictions for Configuring IPv6 MLD Snooping
Information About Configuring IPv6 MLD Snooping
MLD Messages
MLD Queries
Multicast Client Aging Robustness
Multicast Router Discovery
MLD Reports
MLD Done Messages and Immediate-Leave
Topology Change Notification Processing
Default MLD Snooping Configuration
MLD Snooping Configuration Guidelines
Enabling or Disabling MLD Snooping
Multicast Router Port
MLD Immediate Leave
How to Configure IPv6 MLD Snooping
Enabling or Disabling MLD Snooping
Configuring a Static Multicast Group
Configuring a Multicast Router Port
Enabling MLD Immediate Leave
Configuring MLD Snooping Queries
Disabling MLD Listener Message Suppression
Monitoring and Maintaining IPv6 MLD Snooping
Configuration Examples for Configuring IPv6 MLD Snooping
Statically Configure an IPv6 Multicast Group: Example
Adding a Multicast Router Port to a VLAN: Example
Enabling MLD Immediate Leave on a VLAN: Example
Setting MLD Snooping Global Robustness: Example
Page
Page
Page
Page
Configuring Cisco IOS IP SLAs Operations
Finding Feature Information
Prerequisites for Configuring Cisco IOS IP SLAs Operations
Restrictions for Configuring Cisco IOS IP SLAs Operations
Information About Configuring Cisco IOS IP SLAs Operations
Cisco IOS IP SLAs
Cisco IOS IP SLAs to Measure Network Performance
IP SLAs Responder and IP SLAs Control Protocol
Response Time Computation for IP SLAs
IP SLAs Operation Scheduling
IP SLAs Operation Threshold Monitoring
IP Service Levels by Using the UDP Jitter Operation
IP Service Levels by Using the ICMP Echo Operation
How to Configure Cisco IOS IP SLAs Operations
Configuring the IP SLAs Responder
Configuring UDP Jitter Operation
Page
Analyzing IP Service Levels by Using the ICMP Echo Operation
Monitoring and Maintaining Cisco IP SLAs Operations
Configuration Examples for Configuring Cisco IP SLAs Operations
Configuring an ICMP Echo IP SLAs Operation: Example
45-12
Sample Output for Show IP SLA Command: Example
This is an example of the output from the command:
Configuring a Responder UDP Jitter IP SLAs Operation: Example
Configuring a UDP Jitter IP SLAs Operation: Example
This example shows how to configure a UDP jitter IP SLAs operation:
Page
Page
Troubleshooting
Information for Troubleshooting
Autonegotiation Mismatches Prevention
SFP Module Security and Identification
Ping
Layer 2 Traceroute
Layer 2 Traceroute Usage Guidelines
IP Traceroute
TDR
Crashinfo Files
Basic crashinfo Files
Extended crashinfo Files
CPU Utilization
Problem and Cause for High CPU Utilization
How to Troubleshoot
Recovering from Software Failures
Recovering from a Lost or Forgotten Password
Recovering from Lost Cluster Member Connectivity
Executing Ping
Executing IP Traceroute
Running TDR and Displaying the Results
Enabling Debugging on a Specific Feature
Enabling All-System Diagnostics
Redirecting Debug and Error Message Output
Monitoring Information
Physical Path
SFP Module Status
Troubleshooting Examples
show platform forward Command
46-15
Page
Page
Page
APPENDIX
A
Working with the Cisco IOS File System, Configuration Files, and Software Images
Working with the Flash File System
Displaying Available File Systems
A-2
Detecting an Unsupported SD Flash Memory Card
This example shows a supported SD flash memory card:
SD Flash Memory Card LED
Setting the Default File System
Displaying Information About Files on a File System
Changing Directories and Displaying the Working Directory
Creating and Removing Directories
Copying Files
Deleting Files
Creating, Displaying, and Extracting tar Files
Creating a tar File
Displaying the Contents of a tar File
Extracting a tar File
Displaying the Contents of a File
Working with Configuration Files
Guidelines for Creating and Using Configuration Files
Configuration File Types and Location
Creating a Configuration File By Using a Text Editor
Copying Configuration Files By Using TFTP
Preparing to Download or Upload a Configuration File By Using TFTP
Downloading the Configuration File By Using TFTP
Uploading the Configuration File By Using TFTP
Copying Configuration Files By Using FTP
Preparing to Download or Upload a Configuration File By Using FTP
Downloading a Configuration File By Using FTP
Uploading a Configuration File By Using FTP
Copying Configuration Files By Using RCP
Preparing to Download or Upload a Configuration File By Using RCP
Downloading a Configuration File By Using RCP
Uploading a Configuration File By Using RCP
Clearing Configuration Information
Clearing the Startup Configuration File
Deleting a Stored Configuration File
Replacing and Rolling Back Configurations
Understanding Configuration Replacement and Rollback
Configuration Guidelines
Configuring the Configuration Archive
Performing a Configuration Replacement or Rollback Operation
Working with Software Images
Image Location on the Switch
tar File Format of Images on a Server or Cisco.com
Copying Image Files By Using TFTP
Preparing to Download or Upload an Image File By Using TFTP
Downloading an Image File By Using TFTP
Page
Uploading an Image File By Using TFTP
Copying Image Files By Using FTP
Preparing to Download or Upload an Image File By Using FTP
Downloading an Image File By Using FTP
Uploading an Image File By Using FTP
Copying Image Files By Using RCP
Preparing to Download or Upload an Image File By Using RCP
Downloading an Image File By Using RCP
Uploading an Image File By Using RCP
Page
Page
INDEX
Numerics
A
Page
B
C
Page
D
Page
Page
Page
E
F
G
H
I
Page
Page
J
K
L
M
Page
Page
N
O
P
Page
Page
Q
R
Page
Page
S
Page
Page
Page
T
Page
U
V
Page
W
X