Main
            Page
              CONTENTS
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
            Page
              Preface
Audience                
Organization
            Page
            Page
              Conventions
              Related Documentation
Hardware Documents              
Software Documentation
Cisco IOS Documentation                
Commands in Task Tables
              Notices
OpenSSL/Open SSL Project                
License Issues
            Page
              Obtaining Documentation and Submitting a Service Request
            Page
              Product Overview
Layer 2 Software Features              
802.1Q Tunneling, VLAN Mapping, and Layer 2 Protocol Tunneling
Auto SmartPort Macros              
Cisco Discovery Protocol
Cisco Group Management Protocol (CGMP) server                
EtherChannel Bundles
Ethernet CFM                
Ethernet OAM Protocol
              Flex Links and MAC Address-Table Move Update
Internet Group Management Protocol (IGMP) Snooping                
IPv6 Multicast Listen Discovery (MLD) and Multicast Listen Discovery snooping
              Jumbo Frames
Link Aggregation Control Protocol                
Link Layer Discovery Protocol
Link State Tracking              
Location Service
Multiple Spanning Tree                
Per-VLAN Rapid Spanning Tree
Quality of Service              
Resilient Ethernet Protocol 
SmartPort Macros              
Spanning Tree Protocol
Stateful Switchover              
SVI Autostate
User-Based Rate Limiting                
Unidirectional Ethernet
Unidirectional Link Detection              
VLANs
Virtual Switch System Client                
Y.1731 (AIS and RDI)
              Layer 3 Software Features
Cisco Express Forwarding              
EIGRP Stub Routing
Enhanced Object Tracking                
GLBP
HSRP                
SSO Aware HSRP
              IP Routing Protocols
BGP                
BGP Route-Map Continue
              EIGRP
IS-IS                
OSPF
RIP              
In Service Software Upgrade
IPv6                
Multicast Services
            Page
              NSF with SSO
OSPF for Routed Access                
Policy-Based Routing
Unidirectional Link Routing                
VRF-lite
              Management Features
              Cisco Call Home
Cisco Energy Wise                
Cisco IOS IP Service Level Agreements
              Cisco Network Assistant
Dynamic Host Control Protocol                
Embedded CiscoView
Embedded Event Manager              
Ethernet Management Port 
FAT File Management System on Supervisor Engine 6-E and 6L-E                
Forced 10/100 Autonegotiation
Intelligent Power Management                
MAC Address Notification
              NetFlow-lite
Secure Shell                
Simple Network Management Protocol
SPAN and RSPAN                
Web Content Coordination Protocol
              Security Features
              802.1X Identity-Based Network Security
              Cisco TrustSec SGT Exchange Protocol (SXP) IPv4
              Dynamic ARP Inspection
Dynamic Host Configuration Protocol Snooping                
Flood Blocking
Hardware-Based Control Plane Policing              
IP Source Guard for Static Hosts
IP Source Guard                
Local Authentication, RADIUS, and TACACS+ Authentication
Network Admission Control              
Network Security with ACLs
Port Security              
PPPoE Intermediate Agent
Storm Control                
uRPF Strict Mode
              Utilities
Layer 2 Traceroute                
Time Domain Reflectometry
Debugging Features                
Web-based Authentication
              Command-Line Interfaces
              Accessing the Switch CLI
Accessing the CLI Using the EIA/TIA-232 Console Interface                
Accessing the CLI Through Telnet
              Performing Command-Line Processing
              Performing History Substitution
About Cisco IOS Command Modes              
Getting a List of Commands and Syntax
              Virtual Console for Standby Supervisor Engine
              ROMMON Command-Line Interface
              Archiving Crashfiles Information
Displaying a Crash Dump              
2-9
              2-10
              2-11
151A3B48: 1586D760 10C7FE38 10C7F17C 1586FF98 10C7FE38 10C7F17C              
2-12
              2-13
              2-14
              2-15
              2-16
              2-17
              2-18
              2-19
            Page
              Configuring the Switch for the First Time
Default Switch Configuration              
Configuring DHCP-Based Autoconfiguration
About DHCP-Based Autoconfiguration              
DHCP Client Request Process
              Configuring the DHCP Server
Configuring the TFTP Server              
Configuring the DNS Server
Configuring the Relay Device              
Obtaining Configuration Files
              Example Configuration
              Configuring the Switch 
              Using Configuration Mode to Configure Your Switch
Verifying the Running Configuration Settings                
3-10
              Saving the Running Configuration Settings to Your Start-Up File
Reviewing the Configuration in NVRAM                
!
              Configuring a Default Gateway
Configuring a Static Route            
Page
              Controlling Access to Privileged EXEC Commands
Setting or Changing a Static enable Password               
Using the enable password and enable secret Commands
Setting or Changing a Privileged Password               
Controlling Switch Access with TACACS+ 
Understanding TACACS+            
Page
              TACACS+ Operation
Configuring TACACS+              
Default TACACS+ Configuration
Identifying the TACACS+ Server Host and Setting the Authentication Key              
Configuring TACACS+ Login Authentication
            Page
              Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
Starting TACACS+ Accounting                
Displaying the TACACS+ Configuration
              Encrypting Passwords
              Configuring Multiple Privilege Levels
Setting the Privilege Level for a Command                
Changing the Default Privilege Level for Lines
              Logging In to a Privilege Level
Exiting a Privilege Level                
Displaying the Password, Access Level, and Privilege Level Configuration
              Recovering a Lost Enable Password
Modifying the Supervisor Engine Startup Configuration                
Understanding the Supervisor Engine Boot Configuration
Understanding the ROM Monitor              
Configuring the Software Configuration Register
              Modifying the Boot Field and Using the boot Command
              Modifying the Boot Field
              Verifying the Configuration Register Setting
              Specifying the Startup System Image
Flash Memory Features                
Security Precautions
Configuring Flash Memory              
Controlling Environment Variables
              Resetting a Switch to Factory Default Settings
            Page
            Page
              Administering the Switch
Managing the System Time and Date              
System Clock 
Understanding Network Time Protocol              
Configuring NTP
              Default NTP Configuration
Configuring NTP Authentication            
Page
              Configuring NTP Associations
              Configuring NTP Broadcast Service
              Configuring NTP Access Restrictions
              Creating an Access Group and Assigning a Basic IP Access List
Disabling NTP Services on a Specific Interface               
Configuring the Source IP Address for NTP Packets
Displaying the NTP Configuration              
Configuring Time and Date Manually
Setting the System Clock              
Displaying the Time and Date Configuration
Configuring the Time Zone               
Configuring Summer Time (Daylight Saving Time)
              Configuring a System Name and Prompt
              Configuring a System Name
Understanding DNS              
Default DNS Configuration
Setting Up DNS                
Displaying the DNS Configuration
              Creating a Banner
              Default Banner Configuration
Configuring a Message-of-the-Day Login Banner                
Configuring a Login Banner
              Managing the MAC Address Table
              Building the Address Table
MAC Addresses and VLANs              
Default MAC Address Table Configuration
Changing the Address Aging Time              
Removing Dynamic Address Entries
Configuring MAC Change Notification Traps            
Page
4-24              
Configuring MAC Move Notification Traps
            Page
              Configuring MAC Threshold Notification Traps
              Adding and Removing Static Address Entries
              Configuring Unicast MAC Address Filtering
            Page
              Disabling MAC Address Learning on a VLAN
Configuring Disable MAC Address Learning              
Deployment Scenarios
Metro (Point to Point Links)                
4-32
              Network Load Balancers
Layer 2 Firewall or Cache              
Feature Compatibility
              Feature Incompatibility
Partial Feature Incompatibility                
Displaying Address Table Entries
              Managing the ARP Table
Configuring Embedded CiscoView Support              
Understanding Embedded CiscoView
Installing and Configuring Embedded CiscoView              
4-37
The following example shows how to install and configure Embedded CiscoView on your switch:              
4-38
              Displaying Embedded CiscoView Information
            Page
              Configuring the Cisco IOS In-Service Software  Upgrade Process
              Prerequisites to Performing ISSU
              About ISSU
Stateful Switchover Overview            
Page
              NSF Overview
              ISSU Process Overview
              5-7
              5-8
supervisor engines when they are running two different versions of Cisco IOS image.              
5-9
            Page
              Performing an ISSU Upgrade: 2 Methods
              Changeversion Process
Changeversion: Quick Option                
Scheduled Changeversion: in and at Options
Changeversion Deployment Scenario                
Aborting an In-Progress Changeversion Procedure
              Guidelines for Performing ISSU
Versioning Capability in Cisco IOS Software to Support ISSU              
Compatibility Matrix
SNMP Support for ISSU                
Compatibility Verification Using Cisco Feature Navigator
              Performing the ISSU Process
              Verifying the ISSU Software Installation
Verifying Redundancy Mode Before Beginning the ISSU Process                
5-17
              Verifying the ISSU State Before Beginning the ISSU Process
              Loading New Cisco IOS Software on the Standby Supervisor Engine
            Page
              5-20
The following example shows how the forced option places the system in RPR mode:              
Switching to the Standby Supervisor Engine
              5-22
engine is running the old version of software and is in the standby hot state.              
Stopping the ISSU Rollback Timer (Optional)
              Loading New Cisco IOS Software on the New Standby Supervisor Engine
              5-25
              Using changeversion to Automate an ISSU Upgrade
            Page
              5-28
Note Standby reloads with target image.              
5-29
Note Switchover occurs.                
Look at the console of "new" ACTIVE supervisor engine.
Note The new" STANDBY reloads with target image; changeversion is successful upon SSO                 
terminal state is reached.
              5-30
5-31              
Aborting a Software Upgrade During ISSU
traffic might be disrupted.              
Configuring the Rollback Timer to Safeguard Against Upgrade Issues
            Page
              Displaying ISSU Compatibility Matrix Information
              5-35
              5-36
            Page
            Page
            Page
            Page
              Configuring Interfaces
              About Interface Configuration
Using the interface Command              
6-3
              Configuring a Range of Interfaces
            Page
              Using the Ethernet Management Port
Understanding the Ethernet Management Port              
Fa1 Interface and mgmtVrf
              Ping
TraceRoute                
Telnet
TFTP                
FTP
              Supported Features on the Ethernet Management Port
Configuring the Ethernet Management Port              
Defining and Using Interface-Range Macros
              Deploying SFP+ in X2 Ports
              Deploying 10-Gigabit Ethernet and Gigabit Ethernet SFP Ports on  Supervisor Engine V-10GE
              Port Numbering TwinGig Convertors
              Limitations on Using a TwinGig Convertor
Selecting X2/TwinGig Convertor Mode            
Page
              Invoking Shared-Backplane Uplink Mode on   Supervisor Engine 6-E
Digital Optical Monitoring Transceiver Support              
Configuring Optional Interface Features
Configuring Ethernet Interface Speed and Duplex Mode                
Speed and Duplex Mode Configuration Guidelines
              Setting the Interface Speed
              Setting the Interface Duplex Mode
Displaying the Interface Speed and Duplex Mode Configuration                
Adding a Description for an Interface
              Configuring Flow Control
            Page
              6-22
              Configuring Jumbo Frame Support
Ports and Modules That Support Jumbo Frames                
Jumbo Frame Support
Maximum Transmission Units              
Jumbo Frame Support Overview
Ethernet Ports                
VLAN Interfaces
              Configuring MTU Sizes
              Interacting with Baby Giants
Configuring the Port Debounce Timer              
Configuring Auto-MDIX on a Port
            Page
              Displaying the Interface Auto-MDIX Configuration
              Understanding Online Insertion and Removal
Monitoring and Maintaining the Interface                
Monitoring Interface and Controller Status
              Clearing and Resetting the Interface
Shutting Down and Restarting an Interface              
Configuring Interface Link Status and Trunk Status Events
              Configuring Link Status Event Notification for an Interface
Global Settings                
Configuring a Switch Global Link Status Logging Event
6-34              
Resetting the Interface to the Default Configuration
            Page
            Page
              Checking Port Status and Connectivity
Checking Module Status              
Checking Interfaces Status
              Displaying MAC Addresses
Checking Cable Status Using Time Domain Reflectometer              
Running the TDR Test
TDR Guidelines              
Using Telnet
              Changing the Logout Timer
Monitoring User Sessions              
Using Ping
Understanding How Ping Works                
Running Ping
              Using IP Traceroute
Understanding How IP Traceroute Works                
Running IP Traceroute
              Using Layer 2 Traceroute 
              Layer 2 Traceroute Usage Guidelines
Running Layer 2 Traceroute              
Configuring ICMP
              Enabling ICMP Protocol Unreachable Messages
Enabling ICMP Redirect Messages              
Enabling ICMP Mask Reply Messages
            Page
              Configuring Supervisor Engine Redundancy Using  RPR and SSO
              About Supervisor Engine Redundancy
              RPR Operation
SSO Operation              
About Supervisor Engine Redundancy Synchronization
RPR Supervisor Engine Configuration Synchronization                
SSO Supervisor Engine Configuration Synchronization
              Supervisor Engine Redundancy Guidelines and Restrictions
            Page
            Page
              Configuring Supervisor Engine Redundancy
Configuring Redundancy              
8-9
This example shows how to display redundancy facility state information:              
Virtual Console for Standby Supervisor Engine
              Synchronizing the Supervisor Engine Configurations
            Page
              Performing a Manual Switchover
Performing a Software Upgrade            
Page
              Manipulating Bootflash on the Redundant Supervisor Engine
            Page
              Configuring Cisco NSF with SSO Supervisor  Engine Redundancy
About NSF with SSO Supervisor Engine Redundancy              
About Cisco IOS NSF-Aware and NSF-Capable Support
            Page
              NSF with SSO Supervisor Engine Redundancy Overview
SSO Operation              
NSF Operation
Cisco Express Forwarding                
Routing Protocols
              BGP Operation
              OSPF Operation
IS-IS Operation                
IETF IS-IS Configuration
Cisco IS-IS Configuration              
EIGRP Operation
              NSF Guidelines and Restrictions
              Configuring NSF with SSO Supervisor Engine Redundancy
Configuring SSO                
9-11
              Configuring CEF NSF
Verifying CEF NSF                
To verify that CEF is NSF-capable, enter the show cef state command:
              Configuring BGP NSF
Verifying BGP NSF              
Configuring OSPF NSF 
Verifying OSPF NSF              
Configuring IS-IS NSF 
              Verifying IS-IS NSF
              9-16
              Configuring EIGRP NSF
Verifying EIGRP NSF            
Page
              Environmental Monitoring and Power  Management
About Environmental Monitoring              
Using CLI Commands to Monitor your Environment
Displaying Environment Conditions                
Conditions on Supervisor Engines II-Plus to V-10GE
Conditions on Supervisor Engine 6-E and Supervisor Engine 6L-E              
Emergency Actions
              System Alarms
            Page
              Power Management
Power Management for the Catalyst 4500 Series Switches              
Supported Power Supplies
              Power Management Modes for the Catalyst 4500 Switch
Selecting a Power Management Mode              
Power Management Limitations in Catalyst 4500 Series Switches
Limitation 1              
Limitation 2
              Configuring Redundant Mode on a Catalyst 4500 Series Switch
              Configuring Combined Mode on a Catalyst 4500 Series Switch
              Available Power for Catalyst 4500 Series Switches Power Supplies
              Special Considerations for the 4200 W AC and 6000 W AC Power Supplies
            Page
              Combined Mode Power Resiliency
            Page
              Special Considerations for the 1400 W DC Power Supply
Configuring the DC Input for a Power Supply              
Special Considerations for the 1400 W DC SP Triple Input Power Supply
Insufficient Inline Power Handling for Supervisor Engine II-TS              
10-20
              Powering Down a Module 
Power Management for the Catalyst 4948 Switches                
Power Management Modes for the Catalyst 4948 Switch
              IEEE 802.3az Energy Efficient Ethernet
              Determining EEE Capability
Enabling EEE                
Determining EEE Status
            Page
              Configuring Power over Ethernet
About Power over Ethernet              
Hardware Requirements
              Power Management Modes
              Intelligent Power Management
              Configuring Power Consumption for Powered Devices on an  Interface
              Displaying the Operational Status for an Interface
11-7                
This example shows how to display the operational status for Fast Ethernet interface 4/1:
              Displaying all PoE Detection and Removal Events
              Displaying the PoE Consumed by a Module
              11-9
              11-10
              11-11
              PoE Policing and Monitoring
PoE Policing Modes              
Configuring Power Policing on an Interface
              Displaying Power Policing on an Interface
Configuring Errdisable Recovery              
Enhanced Power PoE Support on the E-Series Chassis
            Page
              Configuring the Catalyst 4500 Series Switch   with Cisco Network Assistant
              About Network Assistant
Community Overview                
Clustering Overview
              Network Assistant-Related Parameters and Their Defaults
Network Assistant CLI Commands              
Configuring Your Switch for Network Assistant
(Minimum) Required Configuration              
(Additional) Configuration Required to Use Community
(Additional) Configuration Required to Use Clustering              
Managing a Network Using Community
              Candidate and Member Requirements
Automatic Discovery of Candidates and Members              
Community Names
Hostnames                
Passwords
Communication Protocols              
Access Modes in Network Assistant
Community Information                
Adding Devices
              Converting a Cluster into a Community
              Managing a Network Using Cluster
Understanding Switch Clusters                
Cluster Command Switch Requirements
              Network Assistant and VTY
Candidate Switch and Cluster Member Switch Requirements                
Using the CLI to Manage Switch Clusters
              Configuring Network Assistant in Community or Cluster Mode
Configuring Network Assistant on a Networked Switch in Community Mode            
Page
              12-15
This example shows how to configure Network Assistant on a networked switch in community mode:                 
Step 27   Step 28  
              12-16
12-17              
Configuring Network Assistant in a Networked Switch in Cluster Mode
Step 1   Step 2   Step 3   Step 4   Step 5   Step 6              
Page
              12-19
              12-20
              Configuring VLANs, VTP, and VMPS
VLANs                
About VLANs
            Page
              VLAN Configuration Guidelines and Restrictions
VLAN Ranges                
Configurable Normal-Range VLAN Parameters
              VLAN Default Configuration
              Configuring VLANs
              Configuring VLANs in Global Configuration Mode
Assigning a Layer 2 LAN Interface to a VLAN              
VLAN Trunking Protocol
              About VTP 
Understanding the VTP Domain              
Understanding VTP Modes
Understanding VTP Advertisements                
Understanding VTP Versions
VTP Version 2              
VTP Version 3
              Understanding VTP Pruning
              VTP Configuration Guidelines and Restrictions
              VTP Default Configuration
              Configuring VTP
Configuring VTP Global Parameters                
Configuring a VTP Password
              Enabling VTP Pruning
Enabling the VTP Version Number              
Configuring the VTP Mode
              13-17
This example shows how to configure the switch as a VTP client:                
This example shows how to disable VTP on the switch:
This example shows how to disable VTP on the switch and to disable VTP advertisement forwarding:              
13-18
              Starting a Takeover
Displaying VTP Statistics                
Displaying VTP Devices in a Domain
              VLAN Membership Policy Server
              About VMPS
Understanding the VMPS Server              
Security Modes for VMPS Server
Open Mode                
Secure Mode
Multiple Mode                
Fallback VLAN
              Overview of VMPS Clients
Understanding Dynamic VLAN Membership              
Default VMPS Client Configuration
Configuring a Switch as a VMPS Client                
Configuring the IP Address of the VMPS Server
              Configuring Dynamic Access Ports on a VMPS Client
              Voice Ports
Reconfirming VLAN Memberships                
Configuring Reconfirmation Interval
              Configuring the Retry Interval
              Administering and Monitoring the VMPS
Troubleshooting Dynamic Port VLAN Membership              
Dynamic Port VLAN Membership Configuration Example
              13-30
            Page
              VMPS Database Configuration File Example
              13-33
            Page
              Configuring IP Unnumbered Interface
About IP Unnumbered Interface Support              
IP Unnumbered Interface Support with DHCP Server and Relay Agent
DHCP Option 82                
IP Unnumbered Interface with Connected Host Polling
              IP Unnumbered Configuration Guidelines and Restrictions
              Configuring IP Unnumbered Interface Support with DHCP Server
Configuring IP Unnumbered Interface Support on LAN and VLAN Interfaces                
Configuring IP Unnumbered Interface Support on a Range of Ethernet VLANs
              Configuring IP Unnumbered Interface Support with Connected  Host Polling
              Displaying IP Unnumbered Interface Settings
              Troubleshooting IP Unnumbered Interface
            Page
              Configuring Layer 2 Ethernet Interfaces
About Layer 2 Ethernet Switching              
Layer 2 Ethernet Switching
Switching Frames Between Segments                
Building the MAC Address Table
              VLAN Trunks
Encapsulation Types                
Layer 2 Interface Modes
              Default Layer 2 Ethernet Interface Configuration
              Layer 2 Interface Configuration Guidelines and Restrictions
Configuring Ethernet Interfaces for Layer 2 Switching              
Configuring an Ethernet Interface as a Layer 2 Trunk
            Page
              Configuring an Interface as a Layer 2 Access Port
15-9                
This example shows how to configure the Fast Ethernet interface 5/6 as an access port in VLAN 200:
Step 2                  
To clear the Layer 2 configuration on an interface, perform this task:
              Clearing Layer 2 Configuration
Step 8                  
Displays the switch port configuration of the interface.
Step 9                  
Step 1  
            Page
              Configuring Auto SmartPort Macros
About Auto SmartPorts              
Configuring Auto SmartPorts
              Enabling Auto SmartPorts
Auto SmartPorts Default Configuration              
Auto SmartPorts Configuration Guidelines
            Page
              Configuring Auto SmartPorts Built-in Macro Parameters
              Configuring User-Defined Event Triggers
802.1X-Based Event Trigger              
MAC Address-Based Event Trigger
              Configuring Mapping Between User-Defined Triggers and Built-in Macros
Configuring Auto SmartPorts User-Defined Macros            
Page
            Page
            Page
              Displaying Auto SmartPorts
              17-14
              Configuring SmartPort Macros
About SmartPort Macros and Static SmartPort              
Configuring SmartPort Macros
              Passing Parameters Through the Macro
Macro Parameter Help              
Default SmartPort Macro Configuration
cisco-global                
cisco-desktop
16-5              
cisco-phone
This is the example for the cisco-phone macro:                
cisco-router
This is the example for the cisco-router macro:                
cisco-switch
              SmartPort Macro Configuration Guidelines
            Page
              Creating SmartPort Macros
              Applying SmartPort Macros
              cisco-global
16-11              
cisco-desktop
Note This macro requires the $AVID keyword, which is the access VLAN of the port.                
cisco-phone
Note This macro requires the $AVID and $VVID keywords, which are the access and voice VLANs of the                 
port.
              cisco-switch
Note This macro requires the $NVID keyword, which is the native VLANs of the port.                
16-13
              cisco-router
Note This macro requires the $NVID keyword, which is the native VLANs of the port.              
Displaying SmartPort Macros
Configuring Static SmartPort Macros                
Default Static SmartPort Configuration
              Static SmartPort Configuration Guidelines
Applying Static SmartPort Macros            
Page
              Configuring STP and MST
About STP              
Understanding the Bridge ID
Bridge Priority Value                
Extended System ID
STP MAC Address Allocation              
Bridge Protocol Data Units
              Election of the Root Bridge
STP Timers              
Creating the STP Topology
STP Port States              
MAC Address Allocation
STP and IEEE 802.1Q Trunks                
Per-VLAN Rapid Spanning Tree
              Default STP Configuration
Configuring STP              
Enabling STP
              Enabling the Extended System ID
              Configuring the Root Bridge
              18-11
You can set the switch as the root:                
This configuration is the one after the switch becomes the root:
              Configuring a Secondary Root Switch
              Configuring STP Port Priority
              18-14
              Configuring STP Port Cost
            Page
              Configuring the Bridge Priority of a VLAN
Configuring the Hello Time              
Configuring the Maximum Aging Time for a VLAN
              Configuring the Forward-Delay Time for a VLAN
              Disabling Spanning Tree Protocol
Enabling Per-VLAN Rapid Spanning Tree              
Specifying the Link Type
Restarting Protocol Migration              
About MST
IEEE 802.1s MST              
IEEE 802.1w RSTP
RSTP Port Roles                
RSTP Port States
              MST-to-SST Interoperability
              Common Spanning Tree
              MST Instances
MST Configuration Parameters                
MST Regions
MST Region Overview              
Boundary Ports
IST Master                
Edge Ports
Link Type              
Message Age and Hop Count
MST-to-PVST+ Interoperability              
MST Configuration Restrictions and Guidelines
Configuring MST                
Enabling MST
            Page
18-31              
Configuring MST Instance Parameters
To configure MST instance parameters, perform this task:                
This example shows how to configure MST instance parameters: 
Step 1   Step 2                  
Step 3   Step 4  
              Configuring MST Instance Port Parameters
To configure MST instance port parameters, perform this task:                
This example shows how to configure MST instance port parameters: 
Step 1   Step 2   Step 3   Step 4                
Restarting Protocol Migration
Displaying MST Configurations              
18-34
The following examples show how to display spanning tree VLAN configurations in MST mode:               
18-35
              18-36
              Configuring Flex Links and MAC Address-Table  Move Update
About Flex Links              
Flex Links
VLAN Flex Links Load Balancing and Support              
Flex Links Failover Actions
              MAC Address-Table Move Update
              Configuring Flex Links
              Configuring Flex Links
            Page
              Configuring VLAN Load Balancing on Flex Links
            Page
              Configuring MAC Address-Table Move Update
Configuring the MAC Address-Table Move Update Feature                
Configuring a Switch to Send MAC Address-Table Move Updates
            Page
Configuring a Switch to Receive MAC Address-Table Move Updates              
Monitoring Flex Links and the MAC Address-Table Move  Update
              Configuring Resilient Ethernet Protocol 
About REP            
Page
            Page
              Link Integrity
Fast Convergence                
VLAN Load Balancing
            Page
              Spanning Tree Interaction
REP Ports              
Configuring REP
Default REP Configuration                
REP Configuration Guidelines
              Configuring the REP Administrative VLAN
              Configuring REP Interfaces
            Page
            Page
            Page
              Setting Manual Preemption for VLAN Load Balancing
Configuring SNMP Traps for REP              
Monitoring REP
              Configuring Optional STP Features
              About Root Guard
Enabling Root Guard              
About Loop Guard
            Page
              Enabling Loop Guard
              About EtherChannel Guard
Enabling EtherChannel Guard (Optional)              
About PortFast
Enabling PortFast              
About BPDU Guard
              Enabling BPDU Guard
About PortFast BPDU Filtering              
Enabling PortFast BPDU Filtering
              About UplinkFast
              Enabling UplinkFast
            Page
              About BackboneFast
            Page
              Enabling BackboneFast
              21-17
This example shows how to display a summary of port states:                
This example shows how to display the total lines of the spanning tree state section:
              21-18
              Configuring EtherChannel and Link State  Tracking
              About EtherChannel
Port Channel Interfaces              
Configuring EtherChannels
EtherChannel Configuration Overview                
Manual EtherChannel Configuration
PAgP EtherChannel Configuration              
IEEE 802.3ad LACP EtherChannel Configuration
Load Balancing              
EtherChannel Configuration Guidelines and Restrictions
              Configuring EtherChannel
Configuring Layer 3 EtherChannels              
Creating Port Channel Logical Interfaces
Configuring Physical Interfaces as Layer 3 EtherChannels            
Page
              22-9
This example shows how to display a one-line summary per channel group:              
Configuring Layer 2 EtherChannels
              22-11
The following two examples show how to verify the configuration of Fast Ethernet interface 5/6:              
Configuring LACP Standalone or Independent Mode
              Configuring the LACP System Priority and System ID
              Configuring EtherChannel Load Balancing
              Removing an Interface from an EtherChannel
Removing an EtherChannel              
Displaying EtherChannel to a Virtual Switch System
Understanding VSS Client                 
Virtual Switch System
Dual-Active Scenarios                
Dual-Active Detection Using Enhanced PAgP
              22-17
Displaying EtherChannel Links to VSS              
Understanding Link-State Tracking
            Page
              22-20
              Configuring Link-State Tracking
Default Link-State Tracking Configuration                
Link-State Tracking Configuration Guidelines
Configuring Link-State Tracking              
Displaying Link-State Tracking Status
              Configuring IGMP Snooping and Filtering
About IGMP Snooping             
Page
              Immediate-Leave Processing
              IGMP Configurable-Leave Timer
IGMP Snooping Querier                
Explicit Host Tracking
              Configuring IGMP Snooping
Default IGMP Snooping Configuration              
Enabling IGMP Snooping Globally
Enabling IGMP Snooping on a VLAN              
Configuring Learning Methods
Configuring PIM/DVMRP Learning                
Configuring CGMP Learning
              Configuring a Static Connection to a Multicast Router
Enabling IGMP Immediate-Leave Processing              
Configuring the IGMP Leave Timer
              Configuring IGMP Snooping Querier
              Configuring Explicit Host Tracking
Configuring a Host Statically              
Suppressing Multicast Flooding
IGMP Snooping Interface Configuration              
IGMP Snooping Switch Configuration
              Displaying IGMP Snooping Information
              Displaying Querier Information
Displaying IGMP Host Membership Information              
Displaying Group Information
              Displaying Multicast Router Interfaces
              Displaying MAC Address Multicast Entries
Displaying IGMP Snooping Information on a VLAN Interface                
23-19
This example shows how to display IGMP snooping information on VLAN 5:              
Displaying IGMP Snooping Querier Information
To display IGMP Snooping Querier information, perform this task:                
This example shows how to display Snooping Querier information:
              Configuring IGMP Filtering
Default IGMP Filtering Configuration              
Configuring IGMP Profiles
              Applying IGMP Profiles
              Setting the Maximum Number of IGMP Groups
              Displaying IGMP Filtering Configuration
              Configuring IPv6 MLD Snooping
About MLD Snooping              
MLD Messages
              MLD Queries
Multicast Client Aging                
Multicast Router Discovery
              MLD Reports
MLD Done Messages and Immediate-Leave                
Topology Change Notification Processing
              Configuring IPv6 MLD Snooping
Default MLD Snooping Configuration              
MLD Snooping Configuration Guidelines
Enabling or Disabling MLD Snooping              
Configuring a Static Multicast Group
Configuring a Multicast Router Port              
Enabling MLD Immediate Leave
              Configuring MLD Snooping Queries
              Disabling MLD Listener Message Suppression
              Displaying MLD Snooping Information
            Page
              Configuring 802.1Q Tunneling, VLAN Mapping,  and Layer 2 Protocol Tunneling
              About 802.1Q Tunneling
              Configuring 802.1Q Tunneling
802.1Q Tunneling Configuration Guidelines              
Native VLANs
System MTU              
802.1Q Tunneling and Other Features
              Configuring an 802.1Q Tunneling Port
              About VLAN Mapping
Deployment Example            
Page
Mapping Customer VLANs to Service-Provider VLANs              
Configuring VLAN Mapping
Default VLAN Mapping Configuration              
VLAN Mapping Configuration Guidelines
              Configuring VLAN Mapping
One-to-One Mapping              
Traditional Q-in-Q on a Trunk Port
Selective Q-in-Q on a Trunk Port              
About Layer 2 Protocol Tunneling
            Page
              Configuring Layer 2 Protocol Tunneling
              Default Layer 2 Protocol Tunneling Configuration
Layer 2 Protocol Tunneling Configuration Guidelines              
Configuring Layer 2 Tunneling
            Page
              Monitoring and Maintaining Tunneling Status
            Page
              Configuring CDP
About CDP              
Configuring CDP
Enabling CDP Globally                
Displaying the CDP Global Configuration
              Enabling CDP on an Interface
Displaying the CDP Interface Configuration                
Monitoring and Maintaining CDP
            Page
              Configuring LLDP, LLDP-MED, and Location  Service
About LLDP, LLDP-MED, and Location Service                
LLDP
              LLDP-MED
              Location Service
              Configuring LLDP and LLDP-MED, and Location Service
Default LLDP Configuration              
Configuring LLDP Characteristics
              Disabling and Enabling LLDP Globally
              Disabling and Enabling LLDP on an Interface
              Configuring LLDP-MED TLVs
              Configuring Network-Policy Profile
              Configuring LLDP Power Negotiation
              Configuring Location TLV and Location Service
            Page
              Monitoring and Maintaining LLDP, LLDP-MED, and Location  Service
            Page
              Configuring UDLD
About UDLD              
UDLD Topology
Fast UDLD Topology              
Operation Modes
Default States for UDLD              
Default UDLD Configuration
Configuring UDLD on the Switch                
Fast UDLD Guidelines and Restrictions
              Enabling UDLD Globally
              Enabling UDLD on Individual Interfaces
              Disabling UDLD on Individual Interfaces
Disabling UDLD on a Fiber-Optic Interface              
Configuring a UDLD Probe Message Interval Globally
Configuring a Fast UDLD Probe Message Interval per Interface                
Resetting Disabled LAN Interfaces
28-9              
Displaying UDLD Link Status
To verify link status reported by UDLD, enter the following command:                
To verify status for a particular link as reported by UDLD, enter the following command:
To verify link status reported by Fast UDLD, enter the following command:              
28-10
To verify status for a particular link as reported by Fast UDLD, enter the following command:              
Configuring Unidirectional Ethernet
About Unidirectional Ethernet              
Configuring Unidirectional Ethernet
            Page
            Page
              Configuring Layer 3 Interfaces
About Layer 3 Interfaces              
Logical Layer 3 VLAN Interfaces
Physical Layer 3 Interfaces              
Understanding SVI Autostate Exclude
Understanding Layer 3 Interface Counters            
Page
              Configuration Guidelines
              Configuring Logical Layer 3 VLAN Interfaces
              Configuring VLANs as Layer 3 Interfaces
Configuring SVI Autostate Exclude            
Page
              Configuring IP MTU Sizes
              Configuring Layer 3 Interface Counters
            Page
              Configuring Physical Layer 3 Interfaces
              Configuring EIGRP Stub Routing
About EIGRP Stub Routing              
Configuring EIGRP Stub Routing
              Dual-Homed Remote Topology
            Page
              X
              EIGRP Stub Routing Configuration Tasks
Configuring EIGRP Stub Routing                
Verifying EIGRP Stub Routing
              Monitoring and Maintaining EIGRP
EIGRP Configuration Examples                
Route Summarization Example
              Route Authentication Example
Stub Routing Example            
Page
            Page
              Configuring Cisco Express Forwarding
About CEF                
CEF Features
              Forwarding Information Base
Adjacency Tables                
Adjacency Discovery
Adjacency Resolution                
Adjacency Types That Require Special Handling
              Catalyst 4500 Series Switch Implementation of CEF
              Hardware and Software Switching
              Hardware Switching
Software Switching                
Load Balancing
Software Interfaces              
CEF Configuration Restrictions
Configuring CEF                
Enabling CEF
              Configuring Load Balancing for CEF
Configuring Per-Destination Load Balancing                
Configuring Load Sharing Hash Function
Viewing CEF Information              
Monitoring and Maintaining CEF
Displaying IP Statistics            
Page
            Page
              Configuring Unicast Reverse Path Forwarding
              About Unicast Reverse Path Forwarding
How Unicast RPF Works            
Page
              Implementing Unicast RPF 
              Security Policy and Unicast RPF
Where to Use Unicast RPF                 
Enterprise Networks with a Single Connection to an ISP
            Page
              Routing Table Requirements
Where Not to Use Unicast RPF                
Unicast RPF with BOOTP and DHCP
              Restrictions
Limitation                
Related Features and Technologies
Prerequisites to Configuring Unicast RPF              
Unicast RPF Configuration Tasks
Configuring Unicast RPF              
Verifying Unicast RPF
              Monitoring and Maintaining Unicast RPF
              Unicast RPF Configuration Example: Inbound and Outbound  Filters
              Configuring IP Multicast
About IP Multicast              
IP Multicast Protocols 
              Internet Group Management Protocol
Protocol-Independent Multicast                 
PIM Dense Mode
PIM Sparse Mode                
Bidirectional PIM Mode
              Rendezvous Point (RP)
IGMP Snooping              
IP Multicast Implementation on the Catalyst 4500 Series Switch
CEF, MFIB, and Layer 2 Forwarding            
Page
              IP Multicast Tables 
            Page
              Hardware and Software Forwarding
Partial Routes                
Software Routes
              Non-Reverse Path Forwarding Traffic
              Multicast Fast Drop
              Multicast Forwarding Information Base
S/M, 224/4                
Restrictions on Using Bidirectional PIM
              Configuring IP Multicast Routing
Default Configuration in IP Multicast Routing              
Enabling IP Multicast Routing
Enabling PIM on an Interface              
Enabling Dense Mode
Enabling Sparse Mode                
Enabling Sparse-Dense Mode
              Enabling Bidirectional Mode
              Enabling PIM-SSM Mapping
Configuring a Rendezvous Point                
Configuring Auto-RP
            Page
            Page
              Configuring a Single Static RP
            Page
              Load Splitting of IP Multicast Traffic
              Monitoring and Maintaining IP Multicast Routing
Displaying System and Network Statistics                
Displaying the Multicast Routing Table
              33-24
Note Interface timers are not updated for hardware-forwarded packets. Entry timers are updated               
33-25
The following is sample output from the show ip mroute command with the active keyword:                
The following is sample output from the show ip mroute command with the count keyword:
              Displaying IP MFIB 
              Displaying Bidirectional PIM Information
Displaying PIM Statistics                
Clearing Tables and Databases
              Configuration Examples
PIM Dense Mode Example                
PIM Sparse Mode Example
              Bidirectional PIM Mode Example
Sparse Mode with a Single Static RP Example                
33-30
              Sparse Mode with Auto-RP: Example
The following example configures sparse mode with Auto-RP:              
Configuring ANCP Client
About ANCP Client              
Enabling and Configuring ANCP Client
Identifying a Port with the ANCP Protocol              
Example 1
Example 2              
Identifying a Port with DHCP Option 82
              ANCP Guidelines and Restrictions
            Page
              Configuring Policy-Based Routing
About Policy-Based Routing              
About PBR
Understanding Route-Maps              
PBR Route-Map Processing Logic
              PBR Route-Map Processing Logic Example
PBR on Supervisor Engine 6-E, Supervisor Engine 6L-E, Catalyst 4900M, and Catalyst 4948E              
PBR Flow Switching
Using Policy-Based Routing              
Policy-Based Routing Configuration Tasks
Enabling PBR            
Page
Enabling Local PBR                
Unsupported Commands
              Policy-Based Routing Configuration Examples
Equal Access                
35-9
set default interface null0 to set interface null0.              
Differing Next Hops
Deny ACE              
35-10
              Configuring VRF-lite
              About VRF-lite
              Default VRF-lite Configuration
              VRF-lite Configuration Guidelines
              Configuring VRFs
              Configuring VRF-Aware Services
Configuring the User Interface for ARP                
Configuring the User Interface for PING
              Configuring the User Interface for SNMP
Configuring the User Interface for uRPF              
Configuring the User Interface for Syslog
Configuring the User Interface for Traceroute                
Configuring the User Interface for FTP and TFTP
Configuring the User Interface for Telnet and SSH                
Configuring the User Interface for NTP
              Configuring Per-VRF for TACACS+ Servers
            Page
              Configuring Multicast VRFs
              Configuring a VPN Routing Session
Configuring BGP PE to CE Routing Sessions              
VRF-lite Configuration Example
36-14              
Configuring Switch S8
On switch S8, enable routing and configure VRF.                
36-15
Configure OSPF routing in VPN1 and VPN2:                
Configure BGP for CE to PE routing:
              Configuring Switch S20 
Configure S20 to connect to CE:                
36-16
              Configuring Switch S11 
Configure S11 to connect to CE:                
Configuring the PE Switch S3
On switch S3 (the router), these commands configure only the connections to switch S8:              
Displaying VRF-lite Status
            Page
              Configuring Quality of Service
              About QoS
Prioritization            
Page
              QoS Terminology
            Page
              Basic QoS Model
Classification            
Page
              37-8
Software Configuration GuideRelease 15.0(2)SG OL-23818-01                
Chapter 37      Configuring Quality of Service About QoS
Figure 37-3 Classification Flowchart              
Classification Based on QoS ACLs 
Classification Based on Class Maps and Policy Maps              
Policing and Marking
            Page
              37-12
Software Configuration GuideRelease 15.0(2)SG OL-23818-01                
Chapter 37      Configuring Quality of Service About QoS
Figure 37-4 Policing and Marking Flowchart              
Internal DSCP Values
Internal DSCP Sources                
Egress ToS and CoS Sources
              Mapping Tables
Queueing and Scheduling                
Active Queue Management
              Sharing Link Bandwidth Among Transmit Queues
Strict Priority / Low Latency Queueing                
Traffic Shaping
              Packet Modification
Per-Port Per-VLAN QoS                
QoS and Software Processed Packets
              Configuring QoS on Supervisor Engines II-Plus, II+10GE, IV, V,  V-10GE, 4924, 4948, and 4948-10GE
              Default QoS Configuration
            Page
              Enabling QoS Globally
Enabling IP DSCP Rewrite              
Configuring a Trusted Boundary to Ensure Port Security
              Enabling Dynamic Buffer Limiting
              Enabling DBL Globally
Selectively Enable DBL              
Enabling DBL on Specific IP DSCP Values
              Enabling DBL on Specific CoS Values
              Creating Named Aggregate Policers
            Page
              Configuring a QoS Policy
Overview of QoS Policy Configuration               
Configuring a Class Map (Optional)
Creating a Class Map                
Configuring Filtering in a Class Map
              Verifying Class-Map Configuration
              Configuring a Policy Map
Creating a Policy Map                
Configuring Policy-Map Class Actions
            Page
            Page
            Page
Verifying Policy-Map Configuration              
Attaching a Policy Map to an Interface
              Configuring CoS Mutation
              Configuring User-Based Rate-Limiting
            Page
              37-39
37-40              
Example 5
Assume that there are two active flows on FastEthernet interface 6/1:                
Note If you use the match flow ip source-address | destination-address command, these two flows are 
consolidated into one flow because they have the same source and destination address.              
Configuring Hierarchical Policers
            Page
              Enabling Per-Port Per-VLAN QoS
              37-44
              37-45
              Enabling or Disabling QoS on an Interface
Configuring VLAN-Based QoS on Layer 2 Interfaces            
Page
              Configuring the Trust State of Interfaces
              Configuring the CoS Value for an Interface
Configuring DSCP Values for an Interface              
Configuring Transmit Queues
              Mapping DSCP Values to Specific Transmit Queues
Allocating Bandwidth Among Transmit Queues              
Configuring Traffic Shaping of Transmit Queues
Configuring a High Priority Transmit Queue              
Configuring DSCP Maps
Configuring the CoS-to-DSCP Map              
Configuring the Policed-DSCP Map
              Configuring the DSCP-to-CoS Map
            Page
              Generated Auto-QoS Configuration
              Effects of Auto-QoS on the Configuration
              Enabling Auto-QoS for VoIP
              Displaying Auto-QoS Information
Auto-QoS Configuration Example              
37-61
            Page
              MQC-Based QoS Configuration
              MQC-Based QoS on the Supervisor Engine 6-E and 6L-E
Input                
Output
              Platform-Supported Classification Criteria and QoS Features
              Platform Hardware Capabilities
Prerequisites for Applying a QoS Service Policy                
Restrictions for Applying a QoS Service Policy
Classification                
Classification Statistics
              Policing
              Implementing Policing
Platform Restrictions              
Marking Network Traffic
Information about Marking Network Traffic                
Purpose of Marking Network Traffic
Benefits of Marking Network Traffic              
Methods for Marking Traffic Attributes
              Marking Action Drivers
              Traffic Marking Procedure Flowchart
Restrictions for Marking Network Traffic              
Multi-attribute Marking Support
Hardware Capabilities for Marking                
Configuring the Policy-Map Marking Action
              Configuring Table Map-Based Unconditional Marking
Configuring Policer Result-Based Conditional Marking                
Marking Statistics
              Shaping, Sharing (Bandwidth), Priority Queuing, Queue-Limiting and DBL
              Shaping
            Page
              Sharing (Bandwidth)
            Page
              Priority Queuing
            Page
              Queue-limiting
Queue Memory                
Service Policy Association 
              Queue Allocation Failure
              Active Queue Management by Using Dynamic Buffer Limiting
              Transmit Queue Statistics
Policy Associations              
QoS Action Restrictions
QoS Policy Priorities                
Qos Policy Merging
              Software QoS
High Priority Packets                
Low Priority Packets 
              Configuring CoS Mutation
              Configuring System Queue Limit
            Page
            Page
            Page
              Configuring Voice Interfaces
About Voice Interfaces              
Cisco IP Phone Voice Traffic
Cisco IP Phone Data Traffic              
Configuring a Port to Connect to a Cisco 7960 IP Phone
Configuring Voice Ports for Voice and Data Traffic            
Page
              Overriding the CoS Priority of Incoming Frames
Configuring Power            
Page
              Configuring Private VLANs
About Private VLANs              
Purpose of a PVLAN
              PVLAN Terminology
            Page
              PVLANs across Multiple Switches
Standard Trunk Ports              
Isolated PVLAN Trunk Ports
              Promiscuous PVLAN Trunk Ports
              PVLAN Modes Over Gigabit Etherchannel
Private-VLAN Interaction with Other Features                
PVLANs and VLAN ACL/QoS
              PVLANs and Unicast, Broadcast, and Multicast Traffic
PVLANs and SVIs                
Per-Virtual Port Error-Disable on PVLANs
              PVLAN Commands
              Configuring PVLANs
              Basic PVLAN Configuration Procedure
Default Private-VLAN Configuration                
PVLAN Configuration Guidelines and Restrictions
            Page
            Page
              Configuring a VLAN as a PVLAN
              Associating a Secondary VLAN with a Primary VLAN
              Configuring a Layer 2 Interface as a PVLAN Promiscuous Port
              Configuring a Layer 2 Interface as a PVLAN Host Port
              Configuring a Layer 2 Interface as an Isolated PVLAN Trunk Port
            Page
              Configuring a Layer 2 Interface as a Promiscuous PVLAN Trunk Port
            Page
              Permitting Routing of Secondary VLAN Ingress Traffic
              Configuring PVLAN over EtherChannel
Configuring a Layer 2 EtherChannel                
Configuring a Layer 2 Etherchannel as a PVLAN Promiscuous Port
            Page
              Configuring a Layer 2 EtherChannel as a PVLAN Host Port
              Configuring a Layer 2 EtherChannel as an Isolated PVLAN Trunk Port
              Configuring a Layer 2 Etherchannel as a Promiscuous PVLAN Trunk Port
            Page
              39-30
              Configuring 802.1X Port-Based Authentication
About 802.1X Port-Based Authentication              
Device Roles
              802.1X and Network Access Control
              Authentication Initiation and Message Exchange
              Ports in Authorized and Unauthorized States
40-6              
802.1X Host Mode
              Single-Host Mode
Multiple-Hosts Mode                
Multidomain Authentication Mode
Multiauthentication Mode                
Pre-authentication Open Access
              802.1X Violation Mode
              Using MAC Move
Using MAC Replace              
Using 802.1X with VLAN Assignment
              Using 802.1X for Guest VLANs
Usage Guidelines for Using 802.1X Authentication with Guest VLANs                
Usage Guidelines for Using 802.1X Authentication with Guest VLANs on Windows-XP Hosts
              Using 802.1X with MAC Authentication Bypass
              Feature Interaction
              Using 802.1X with Web-Based Authentication
Using 802.1X with Inaccessible Authentication Bypass              
Using 802.1X with Unidirectional Controlled Port
Unidirectional State                
Bidirectional State
              Using 802.1X with VLAN User Distribution
Deployment Example              
Using 802.1X with Authentication Failed VLAN Assignment
              Usage Guidelines for Using Authentication Failed VLAN Assignment
              Using 802.1X with Port Security
              Using 802.1X Authentication with ACL Assignments and Redirect URLs
Cisco Secure ACS and AV Pairs for URL-Redirect                 
ACLs
              Using 802.1X with RADIUS-Provided Session Timeouts
              Using 802.1X with Voice VLAN Ports
Using Multiple Domain Authentication and Multiple Authentication            
Page
              802.1X Supplicant and Authenticator Switches with Network Edge Access  Topology
Deployment                
SSw Supplicant to ASw-switch Authenticator for clients
ASw Authenticator              
How 802.1X Fails on a Port
Supported Topologies              
Configuring 802.1X Port-Based Authentication
              Default 802.1X Configuration
              802.1X Configuration Guidelines
Enabling 802.1X Authentication            
Page
            Page
              40-31
The following example illustrates when a port is authorized:              
Configuring Switch-to-RADIUS-Server Communication
            Page
              Configuring Multiple Domain Authentication and Multiple Authorization
            Page
              40-36
              40-37
This example shows how to verify the dot1x MDA settings on interface FastEthernet3/1:                
Note This example applies to Cisco IOS Release 12.2(50)SG and later releases.
              Configuring 802.1X Authentication with ACL Assignments and Redirect URLs
Downloadable ACL                
Configuring the Switch for Downloadable ACL
40-39              
Debug Commands for DACL
The following command displays the contents of the downloadable ACL:                
Cisco ACS Configuration for DACL
              URL-Redirect
40-41              
Configuring ACS
Note A default port ACL must be configured on the interface.                
Configuring the Switch
To configure the switch for URL redirect, follow these steps:                
Step 1 Configure the IP device tracking table.
              Guideline for DACL and URL Redirect
              Configuring a Downloadable Policy
              Configuring 802.1X Authentication with Per-User ACL and Filter-ID ACL
Per-User ACL and Filter-ID ACL                
40-45
              Configuring the Switch 
To configure the switch for per-user ACL and filter-ID ACL:                
Step 1 Configure the IP device tracking table.
Step 2 Configure static ACL for the interface.                
Per-User ACL Configuration in ACS
              Filter-Id Configuration in ACS
              Debug Commands for Per-User ACL and Filter-ID ACL
            Page
              Guidelines for Per-User ACL and Filter-ID ACL
              Configuring a Per-User ACL and Filter-ID ACL
              Configuring RADIUS-Provided Session Timeouts
              40-52
Cisco IOS Release 12.2(46) or earlier              
Configuring MAC Move
Configuring MAC Replace              
Configuring Violation Action
              Configuring 802.1X with Guest VLANs
            Page
            Page
              Configuring 802.1X with MAC Authentication Bypass
            Page
              Configuring 802.1X with Inaccessible Authentication Bypass
            Page
            Page
40-63              
Configuring 802.1X with Unidirectional Controlled Port
To configure unidirectional controlled port, perform this task:            
Page
40-65              
Configuring 802.1X with VLAN User Distribution
You will need to configure the switch and ACS to configure 802.1X with VLAN user distribution.                
Configuring the Switch
To configure the switch, follow these steps:                
Step 1 Create a VLAN group on the switch.
              show commands
              ACS Configuration
              Configuring 802.1X with Authentication Failed
            Page
              Configuring 802.1X with Voice VLAN
              Configuring 802.1X with VLAN Assignment
              Cisco ACS Configuration for VLAN Assignment
              Enabling Fallback Authentication
            Page
            Page
            Page
              40-77
40-78              
Enabling Periodic Reauthentication
            Page
              Enabling Multiple Hosts
              Changing the Quiet Period
              Changing the Switch-to-Client Retransmission Time
              Setting the Switch-to-Client Frame-Retransmission Number
            Page
              Configuring an Authenticator and a Supplicant Switch with NEAT
Configuring Switch as an Authenticator              
Cisco AV Pair Configuration
            Page
            Page
              Configuring Switch as a Supplicant
              Configuring NEAT with ASP
Configuration Guidelines              
Manually Reauthenticating a Client Connected to a Port
Initializing the 802.1X Authentication State                
Removing 802.1X Client Information
Resetting the 802.1X Configuration to the Default Values              
Controlling Switch Access with RADIUS
              Understanding RADIUS
              RADIUS Operation
RADIUS Change of Authorization              
Overview
Change-of-Authorization Requests                
RFC 5176 Compliance 
Preconditions               
CoA Request Response Code
Session Identification                
CoA ACK Response Code
CoA NAK Response Code              
CoA Request Commands
              Session Reauthentication
Session Termination              
CoA Disconnect-Request
CoA Request: Disable Host Port                
CoA Request: Bounce-Port 
              Configuring RADIUS
Default RADIUS Configuration                
Identifying the RADIUS Server Host 
            Page
            Page
              Configuring RADIUS Login Authentication
            Page
              Defining AAA Server Groups
            Page
              Configuring RADIUS Authorization for User Privileged Access and Network Services
              Starting RADIUS Accounting
              Configuring Settings for All RADIUS Servers
Configuring the Switch to Use Vendor-Specific RADIUS Attributes            
Page
              Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
              Configuring CoA on the Switch
Monitoring and Troubleshooting CoA Functionality                
Configuring RADIUS Server Load Balancing
Displaying the RADIUS Configuration              
Displaying 802.1X Statistics and Status
              Displaying Authentication Details
Determining the Authentication Methods Registered with the Auth Manager                
Displaying the Auth Manager Summary for an Interface
Displaying the Summary of All Auth Manager Sessions on the Switch                
40-115
              Verifying the Auth Manager Session for an Interface
The Auth manage session can be verified by using the show authentication sessions command:              
40-116
              Displaying MAB Details
EPM Logging              
40-118
Example 2              
Configuring the PPPoE Intermediate Agent
              RFCs
About PPPoE Intermediate Agent                
Enabling PPPoE IA on a Switch
Configuring the Access Node Identifier for PPPoE IA on a Switch              
Configuring the Identifier String, Option, and Delimiter for PPPoE IA on an  Switch
Configuring the Generic Error Message for PPPoE IA on an Switch              
Enabling PPPoE IA on an Interface
Configuring the PPPoE IA Trust Setting on an Interface                
Configuring PPPoE IA Rate Limiting Setting on an Interface
              Configuring PPPoE IA Vendor-tag Stripping on an Interface
Configuring PPPoE IA Circuit-ID and Remote-ID on an Interface                
Enabling PPPoE IA for a Specific VLAN on an Interface
Configuring PPPoE IA Circuit-ID and Remote-ID for a VLAN on an Interface              
Displaying Configuration Parameters
            Page
41-8              
Clearing Packet Counters
Debugging PPPoE Intermediate Agent              
Troubleshooting Tips
            Page
              Configuring Web-Based Authentication
About Web-Based Authentication              
Device Roles
Host Detection              
Session Creation
Authentication Process              
Customization of the Authentication Proxy Web Pages
Web-Based Authentication Interactions with Other Features                
Port Security
            Page
              Configuring Web-Based Authentication
Default Web-Based Authentication Configuration                
Web-Based Authentication Configuration Guidelines and Restrictions
              Web-Based Authentication Configuration Task List
Configuring the Authentication Rule and Interfaces            
Page
              Configuring AAA Authentication
Configuring Switch-to-RADIUS-Server Communication             
Page
              Configuring the HTTP Server
Customizing the Authentication Proxy Web Pages             
Page
Specifying a Redirection URL for Successful Login              
Configuring the Web-Based Authentication Parameters
Removing Web-Based Authentication Cache Entries              
Displaying Web-Based Authentication Status
              Configuring Port Security
              Port Security Commands
              About Port Security
              Secure MAC Addresses
Maximum Number of Secure MAC Addresses              
Aging Secure MAC Addresses
Sticky Addresses on a Port              
Violation Actions
Invalid Packet Handling              
Configuring Port Security on Access Ports
Configuring Port Security on Access Ports            
Page
            Page
              Examples of Port Security on Access Ports
43-11              
Example 1: Setting Maximum Number of Secure Addresses
Example 2: Setting a Violation Mode                
This example shows how to set the violation mode on the Fast Ethernet interface 3/12 to restrict. 
Example 3: Setting the Aging Timer                
43-12
              Example 4: Setting the Aging Timer Type
Example 5: Configuring a Secure MAC Address                
43-13
              Example 6: Configuring Sticky Port Security
Example 7: Setting a Rate Limit for Bad Packets                
Example 8: Clearing Dynamic Secure MAC Addresses
              Configuring Port Security on PVLAN Ports
Configuring Port Security on an Isolated Private VLAN Host Port              
X
              Example of Port Security on an Isolated Private VLAN Host Port
Configuring Port Security on a Private VLAN Promiscuous Port                
Example of Port Security on a Private VLAN Promiscuous Port
              Configuring Port Security on Trunk Ports
Configuring Trunk Port Security            
Page
              Examples of Trunk Port Security
Example 1: Configuring a Maximum Limit of Secure MAC Addresses for All VLANs                
43-20
              Example 2: Configuring a Maximum Limit of Secure MAC Addresses for Specific VLANs
Example 3: Configuring Secure MAC Addresses in a VLAN Range                
This example shows how to configure a secure MAC-address in a VLAN on interface g1/1:
              Trunk Port Security Configuration Guidelines and Restrictions
Port Mode Changes              
Configuring Port Security on Voice Ports
              Configuring Port Security on Voice Ports
            Page
              Examples of Voice Port Security
Example 1: Configuring Maximum MAC Addresses for Voice and Data VLANs                
43-26
              Example 2: Configuring Sticky MAC Addresses for Voice and Data VLANs
Voice Port Security Configuration Guidelines and Restrictions              
Displaying Port Security Settings
              Examples of Security Settings
Example 1: Displaying Security Settings for the Entire Switch                
43-29
              Example 2: Displaying Security Settings for an Interface
This example shows how to display port security settings for Fast Ethernet interface 5/1:                
Example 3: Displaying All Secure Addresses for the Entire Switch
This example shows how to display all secure MAC addresses configured on all switch interfaces:                
43-30
              Example 4: Displaying a Maximum Number of MAC Addresses on an Interface
Example 5: Displaying Security Settings on an Interface for a VLAN Range                
Example 6: Displaying Secured MAC Addresses and Aging Information on an Interface
Example 7: Displaying Secured MAC Addresses for a VLAN Range on an Interface              
Configuring Port Security with Other Features/Environments
DHCP and IP Source Guard              
802.1X Authentication
Configuring Port Security in a Wireless Environment                
Configuring Port Security over Layer 2 EtherChannel
              Port Security Configuration Guidelines and Restrictions
            Page
              Configuring Control Plane Policing and Layer 2  Control Packet QoS
Configuring Control Plane Policing              
About Control Plane Policing
              General Guidelines for Control Plane Policing
              Configuring CoPP for Control Plane Traffic
              44-5
The following example shows how to police CDP packets:                
Step 4  
Step 5                
Configuring CoPP for Data Plane and Management Plane Traffic
            Page
              Control Plane Policing Configuration Guidelines and Restrictions
All supervisor engines                
Do not apply to Catalyst 4900M, Catalyst 4948E, Supervisor Engine 6-E, and Supervisor Engine 6L-E
44-9              
Monitoring CoPP
              44-10
To clear the counters on the control plane, enter the clear control-plane * command:                
To display all the CoPP access list information, enter the show access-lists command:
              Configuring Layer 2 Control Packet QoS
Understanding Layer 2 Control Packet QoS              
Enabling Layer 2 Control Packet QoS
              Disabling Layer 2 Control Packet QoS
              Layer 2 Control Packet QoS Configuration Examples
            Page
              Layer 2 Control Packet QoS Guidelines and Restrictions
              Policing IPv6 Control Traffic
              44-18
The following example shows how to policy to interface gi2/2 in the input direction:              
Configuring Dynamic ARP Inspection
About Dynamic ARP Inspection              
ARP Cache Poisoning
Purpose of Dynamic ARP Inspection              
Interface Trust State, Security Coverage and Network Configuration
              Relative Priority of Static Bindings and DHCP Snooping Entries
Logging of Dropped Packets                
Rate Limiting of ARP Packets
Port Channels Function              
Configuring Dynamic ARP Inspection
Configuring Dynamic ARP Inspection in DHCP Environments            
Page
              DAI Configuration Example
Switch A              
46-8
46-9              
Switch B
              46-10
              Configuring ARP ACLs for Non-DHCP Environments
            Page
              46-13
              Configuring the Log Buffer
            Page
              Limiting the Rate of Incoming ARP Packets
            Page
              46-18
46-19              
Performing Validation Checks
            Page
              46-21
            Page
              Configuring DHCP Snooping, IP Source Guard,  and IPSG for Static Hosts
About DHCP Snooping              
Trusted and Untrusted Sources
About the DHCP Snooping Database Agent            
Page
              Option 82 Data Insertion
              Circuit ID Suboption Frame Format
Remote ID Suboption Frame Format              
Configuring DHCP Snooping
Circuit ID Suboption Frame Format (for user-configured string):                
Remote ID Suboption Frame Format (for user-configured string):
              Default Configuration for DHCP Snooping
Enabling DHCP Snooping            
Page
              Enabling DHCP Snooping on the Aggregration Switch
              Enabling DHCP Snooping and Option 82
            Page
              Enabling DHCP Snooping on Private VLAN
Configuring DHCP Snooping on Private VLAN                
Configuring  DHCP Snooping with an Ethernet Channel Group
              Enabling the DHCP Snooping Database Agent
Limiting the Rate of Incoming DHCP Packets            
Page
45-15              
Configuration Examples for the Database Agent
The following examples show how to configuration commands in the previous procedure:                
Example 1: Enabling the Database Agent
            Page
              Example 2: Reading Binding Entries from a TFTP File
45-18                
Example 3: Adding Information to the DHCP Snooping Database
Step 3                  
To manually add a binding to the DHCP snooping database, perform this task:
              Displaying DHCP Snooping Information
Step 1   Step 2                  
command.
Displaying a Binding Table                
Displaying the DHCP Snooping Configuration
              About IP Source Guard
              Configuring IP Source Guard
            Page
Configuring IP Source Guard on Private VLANs              
Displaying IP Source Guard Information
              Displaying IP Source Binding Information
              Configuring IP Source Guard for Static Hosts
About IP Source Guard for Static Hosts              
Configuring IPSG for Static Hosts on a Layer 2 Access Port
            Page
              45-27
The following example displays all active IP-to-MAC binding entries for all interfaces:              
IPSG for Static Hosts on a PVLAN Host Port
              45-29
            Page
              Configuring Network Security with ACLs
              About ACLs
              Supported Features That Use ACLs
Router ACLs              
Port ACLs
              Dynamic ACLs
VLAN Maps              
Hardware and Software ACL Support
            Page
              TCAM Programming Algorithms
              Changing the Programming Algorithm
            Page
              Resizing the TCAM Regions
              Troubleshooting High CPU Due to ACLs
              Selecting Mode of Capturing Control Packets
              Guidelines and Restrictions
              Selecting Control Packet Capture
              TCAM Programming and ACLs for Supervisor Engine 6-E and  Supervisor Engine 6L-E
Layer 4 Operators in ACLs                
Restrictions for Layer 4 Operations
              Configuration Guidelines for Layer 4 Operations
Layer 4 operation 6 stores gt 20 deny from ACL 102                
Layer 4 operation 7 stores lt 9 deny from ACL 102
Layer 4 operation 8 stores range 11 13 deny from ACL 102              
How ACL Processing Impacts CPU
            Page
              Configuring Unicast MAC Address Filtering
Configuring Named MAC Extended ACLs            
Page
              Configuring EtherType Matching
              Configuring Named IPv6 ACLs
              Applying IPv6 ACLs to a Layer 3 Interface
Configuring VLAN Maps              
VLAN Map Configuration Guidelines
              Creating and Deleting VLAN Maps
Examples of ACLs and VLAN Maps            
Page
            Page
              Applying a VLAN Map to a VLAN
Using VLAN Maps in Your Network            
Page
              Denying Access to a Server on Another VLAN
              Displaying VLAN Access Map Information
Using VLAN Maps with Router ACLs                
Guidelines for Using Router ACLs and VLAN Maps on the Same VLAN
              Examples of Router ACLs and VLAN Maps Applied to VLANs
ACLs and Switched Packets              
ACLs and Routed Packets
              Configuring PACLs
Creating a PACL              
PACL Configuration Guidelines
Removing the Requirement for a Port ACL                
Configuration Restrictions
Debugging Considerations              
Webauth Fallback
              Configuring IPv4, IPv6, and MAC ACLs on a Layer 2 Interface
              Using PACL with Access-Group Mode
Configuring Access-group Mode on Layer 2 Interface              
Applying ACLs to a Layer 2 Interface
Displaying an ACL Configuration on a Layer 2 Interface              
Using PACL with VLAN Maps and Router ACLs
            Page
              Configuring RA Guard
Introduction              
Deployment
              Configuring RA Guard
Examples              
Usage Guidelines
            Page
            Page
              Support for IPv6
Finding Feature Information                
About IPv6 
              IPv6 Addressing and Basic Connectivity 
              DHCP
Security                
QoS 
              Management 
Multicast               
Static Routes
First-Hop Redundancy Protocols                
Unicast Routing 
RIP               
OSPF 
EIGRP                
IS-IS
Multiprotocol BGP                
Tunneling 
              IPv6 Default States
            Page
              Port Unicast and Multicast Flood Blocking
About Flood Blocking                
Configuring Port Blocking
              Blocking Flooded Traffic on an Interface
              Resuming Normal Forwarding on a Port
            Page
              Configuring Storm Control
About Storm Control              
Hardware-Based Storm Control Implementation
Software-Based Storm Control Implementation              
Enabling Broadcast Storm Control
50-4                
The following example shows how to enable storm control on interface:
show interface counters storm-control command includes any multicast packets that were dropped.              
Enabling Multicast Storm Control
This section includes these topics:                
  Enabling Multicast Suppression on Catalyst 4900M, Catalyst 4948E, Supervisor Engine 6-E, and 
Supervisor Engine 6L-E, page 50-5                
  Enabling Multicast Suppression on the WS-X4515, WS-X4014, and WS-X4013+ Supervisor 
              Enabling Multicast Suppression on the WS-X4515, WS-X4014, and WS-X4013+  Supervisor Engines
Enabling Multicast Suppression on All Other Supervisor Engines              
Disabling Broadcast Storm Control
              Disabling Multicast Storm Control
50-8              
Displaying Storm Control
Note Use the show interface capabilities command to determine the mode in which storm control is                 
Note Use the show interfaces counters storm-control command to display a count of discarded packets.
The following example shows the output of the show storm-control command:                
the value is N/A for ports that perform suppression in hardware.
              Configuring SPAN and RSPAN
About SPAN and RSPAN            
Page
              SPAN and RSPAN Concepts and Terminology
SPAN Session                
Traffic Types
              Source Port 
              Destination Port
VLAN-Based SPAN                
SPAN Traffic
              SPAN and RSPAN Session Limits
Default SPAN and RSPAN Configuration              
Configuring SPAN
SPAN Configuration Guidelines and Restrictions              
Configuring SPAN Sources
              Configuring SPAN Destinations
Monitoring Source VLANs on a Trunk Interface                
Configuration Scenario
Verifying a SPAN Configuration              
CPU Port Sniffing
            Page
              Encapsulation Configuration
Ingress Packets              
Access List Filtering
ACL Configuration Guidelines              
Configuring Access List Filtering
              Packet Type Filtering
              Configuration Example
Configuring RSPAN                
RSPAN Configuration Guidelines
              Creating an RSPAN Session
            Page
              Creating an RSPAN Destination Session
              Creating an RSPAN Destination Session and Enabling Ingress Traffic
              Removing Ports from an RSPAN Session
              Specifying VLANs to Monitor
              Specifying VLANs to Filter
            Page
              Displaying SPAN and RSPAN Status
            Page
              Configuring System Message Logging
About System Message Logging              
Configuring System Message Logging
System Log Message Format              
Default System Message Logging Configuration
              Disabling Message Logging
              Setting the Message Display Destination Device
              Synchronizing Log Messages
              Enabling and Disabling Timestamps on Log Messages
Enabling and Disabling Sequence Numbers in Log Messages (Optional)              
Defining the Message Severity Level (Optional)
              Limiting Syslog Messages Sent to the History Table and to SNMP (Optional)
              Configuring UNIX Syslog Servers
Logging Messages to a UNIX Syslog Daemon              
Configuring the UNIX System Logging Facility
              Displaying the Logging Configuration
              Onboard Failure Logging (OBFL) 
Prerequisites for OBFL              
Restrictions for OBFL
Information About OBFL                
Overview of OBFL 
Information about Data Collected by OBFL                 
OBFL Data Overview
              Temperature
              Operational Uptime
              53-5
Operational Uptime Example            
Page
              Interrupts
              Message Logging
              Default Settings for OBFL
Enabling OBFL              
Configuration Examples for OBFL
Enabling OBFL Message Logging: Example                
OBFL Message Log: Example
53-11              
OBFL Component Uptime Report: Example
The following example shows how to display a summary report for component uptimes for module 2:                
OBFL Report for a Specific Time: Example
              53-12
              53-13
              53-14
              53-15
            Page
              Configuring SNMP
About SNMP              
SNMP Versions
              SNMP Manager Functions
              SNMP Agent Functions
SNMP Community Strings                
Using SNMP to Access MIB Variables 
SNMP Notifications              
Configuring SNMP
Default SNMP Configuration              
SNMP Configuration Guidelines
              Disabling the SNMP Agent
Configuring Community Strings            
Page
              Configuring SNMP Groups and Users
            Page
              Configuring SNMP Notifications
            Page
            Page
              Setting the Agent Contact and Location Information
              Limiting TFTP Servers Used Through SNMP
SNMP Examples              
Displaying SNMP Status
            Page
            Page
              Configuring NetFlow-lite
              About NetFlow Packet Sampling
Feature Interaction                
System-wide Restrictions
Interface-level Restrictions                
Monitor-level Restrictions
              Configuring Information about the External Collector
Example              
Configuring Sampling Parameters
Example              
Activating Sampling on an Interface or VLAN
            Page
            Page
              Display Commands
55-9                
The following example shows how to display the total number of export packets sent:
              Clear Commands
To clear statistics of a packet sampler at a monitor, use the following commands, as needed:                
Clear the statistics of a packet sampler at a  datasource
            Page
              Configuring NetFlow
              About NetFlow Statistics Collection
NDE Versions              
Information Derived from Hardware
              Information Derived from Software
Assigning the Input and Output Interface and AS Numbers                
Assigning the Inferred Fields
Assigning the Output Interface and Output-Related Inferred Fields                
Assigning the Input Interface and Input-Related Inferred Fields
              Feature Interaction of NetFlow Statistics with UBRL and Microflow Policing
VLAN Statistics              
Configuring NetFlow Statistics Collection
Checking for Required Hardware              
Enabling NetFlow Statistics Collection
              Configuring Switched/Bridged IP Flows
              Exporting NetFlow Statistics
Managing NetFlow Statistics Collection              
Configuring an Aggregation Cache
Verifying Aggregation Cache Configuration and Data Export              
Configuring a NetFlow Minimum Prefix Mask for Router-Based Aggregation
Configuring the Minimum Mask of a Prefix Aggregation Scheme                
Configuring the Minimum Mask of a Destination-Prefix Aggregation Scheme
Configuring the Minimum Mask of a Source-Prefix Aggregation Scheme                
Monitoring and Maintaining Minimum Masks for Aggregation Schemes
              Configuring NetFlow Aging Parameters
56-13              
NetFlow Statistics Collection Configuration Example
              NetFlow Configuration Examples
NetFlow Enabling Scheme Examples                
NetFlow Aggregation Configuration Examples
              Autonomous System Configuration
Destination Prefix Configuration                
Prefix Configuration
Protocol Port Configuration                
Source Prefix Configuration
              NetFlow Minimum Prefix Mask Router-Based Aggregation Scheme Examples
Prefix Aggregation Scheme                
Destination-Prefix Aggregation Scheme
Source-Prefix Aggregation Scheme              
Configuring Ethernet OAM and CFM
              About Ethernet CFM
Ethernet CFM and OAM Definitions                
CFM Domain
            Page
              Maintenance Associations and Maintenance Points
              CFM Messages
Crosscheck Function and Static Remote MEPs                
SNMP Traps and Fault Alarms
Configuration Error List                
IP SLAs Support for CFM
              Configuring Ethernet CFM
              Ethernet CFM Default Configuration
Ethernet CFM Configuration Guidelines              
Configuring the CFM Domain
            Page
            Page
              Configuring Ethernet CFM Crosscheck
            Page
              Configuring Static Remote MEP
              Configuring a Port MEP
            Page
              Configuring SNMP Traps
Configuring Fault Alarms            
Page
              Configuring IP SLAs CFM Operation
              Manually Configuring an IP SLAs CFM Probe or Jitter Operation
            Page
              Configuring an IP SLAs Operation with Endpoint Discovery
            Page
            Page
              Configuring CFM on C-VLAN (Inner VLAN)
            Page
              Feature Support and Behavior
Platform Restrictions and Limitations              
Understanding CFM ITU-T Y.1731 Fault Management
Y.1731 Terminology              
Alarm Indication Signals
Ethernet Remote Defect Indication                
Multicast Ethernet Loopback
              Configuring Y.1731 Fault Management
Default Y.1731 Configuration                
Configuring ETH-AIS
            Page
Using Multicast Ethernet Loopback              
Managing and Displaying Ethernet CFM Information
            Page
              About Ethernet OAM Protocol
              OAM Features
OAM Messages              
Enabling and Configuring Ethernet OAM
Ethernet OAM Default Configuration                
Ethernet OAM Configuration Guidelines
              Enabling Ethernet OAM on an Interface
              Enabling Ethernet OAM Remote Loopback
              Configuring Ethernet OAM Link Monitoring
            Page
            Page
            Page
57-42              
Configuring Ethernet OAM Remote Failure Indications
You can configure an error-disable action to occur on an interface when the following occur:            
Page
            Page
              Configuring Ethernet OAM Templates
            Page
            Page
              57-48
              Displaying Ethernet OAM Protocol Information
              57-50
              Ethernet CFM and Ethernet OAM Interaction
Configuring Ethernet OAM Interaction with CFM              
Configuring the OAM Manager
Enabling Ethernet OAM              
Example: Configuring Ethernet OAM and CFM
            Page
              Configuring Y.1731 (AIS and RDI)
AIS and RDI Terminology              
About Y.1731
Server MEP                
Alarm Indication Signal
              Ethernet Remote Defect Indication
              Configuring Y.1731
Y.1731 Configuration Guidelines              
Configuring AIS Parameters
Clearing MEP from the AIS Defect Condition                
Clearing SMEP from the AIS Defect Condition
              Displaying Y.1731 Information
              58-7
            Page
              Configuring Call Home
              About Call Home
Obtaining Smart Call Home              
Configuring Call Home
              Configuring Contact Information
              Configuring Destination Profiles
Copying a Destination Profile              
Subscribing to Alert Groups
            Page
              Configuring Periodic Notification
Configuring Message Severity Threshold                
Configuring Syslog Pattern Matching
              Configuring General E-Mail Options
              Enabling Call Home
Testing Call Home Communications              
Sending a Call Home Test Message Manually
Sending a Call Home Alert Group Message Manually              
Sending a Request for an Analysis and Report
Sending the Output of a Command              
Configuring and Enabling Smart Call Home
              Displaying Call Home Configuration Information
              59-15
Example 59-2 Configured Call Home Information in Detail              
59-16
Example 59-3 Available Call Home Alert Groups                
Example 59-4 E-Mail Server Status Information
Example 59-5 Information for All Destination Profiles (Predefined and User-Defined)              
59-17
Example 59-6 Information for a User-Defined Destination Profile                 
Example 59-7 Call Home Statistics
              Call Home Default Settings
Alert Group Trigger Events and Commands            
Page
            Page
              Message Contents
            Page
            Page
            Page
              Syslog Alert Notification in Long-Text Format Example
              59-26
              59-27
59-28              
Syslog Alert Notification in XML Format Example
              59-29
              59-30
              59-31
            Page
              Configuring Cisco IOS IP SLA Operations
              Cisco IP SLA Commands
About Cisco IOS IP SLA              
Using Cisco IOS IP SLAs to Measure Network Performance
              IP SLAs Responder and IP SLAs Control Protocol
              Response Time Computation for IP SLAs
              IP SLAs Operation Scheduling
IP SLAs Operation Threshold Monitoring              
Configuring IP SLAs Operations
IP SLA Default Configuration                
IP SLA Configuration Guidelines
              Configuring the IP SLAs Responder
              Analyzing IP Service Levels by Using the UDP Jitter Operation
            Page
              Analyzing IP Service Levels by Using the ICMP Echo Operation
            Page
60-13                
To display IP SLAs operations configuration and results, perform one of these tasks:
              Monitoring IP SLAs Operations
Step 8                  
Step 9  
            Page
              Configuring RMON
About RMON              
61-2
The switch supports these RMON groups (defined in RFC 1757):                
interface.
Gigabit Ethernet interfaces for a specified polling interval.              
Configuring RMON
Default RMON Configuration                
Configuring RMON Alarms and Events
            Page
              Configuring RMON Collection on an Interface
              Displaying RMON Status
              Performing Diagnostics
Configuring Online Diagnostics              
Configuring On-Demand Online Diagnostics
Scheduling Online Diagnostics               
Performing Diagnostics
Starting and Stopping Online Diagnostic Tests              
Displaying Online Diagnostic Tests and Test Results
              62-5
This example shows how to display the online diagnostic results for module 6:                
This example shows how to display the online diagnostic results details for module 6:
___________________________________________________________________________              
62-6
___________________________________________________________________________              
Displaying Data Path Online Diagnostics Test Results
              Line Card Online Diagnostics
Troubleshooting with Online Diagnostics              
62-9
To troubleshoot a faulty line card, follow these steps:                
Step 1 Enter the command show diagnostic result module 3.
              Power-On Self-Test Diagnostics
Overview of Power-On Self-Test Diagnostics              
POST Result Example
            Page
              62-13
              62-14
The following example shows the output for a WS-X45-SUP6-E supervisor engine:                
62-15
              Power-On Self-Test Results for Supervisor Engine V-10GE
              POST on the Active Supervisor Engine
POST Results on an Active Supervisor Engine Example              
62-17
62-18              
POST on a Standby Supervisor Engine
62-19              
Display of the POST on a Standby Supervisor Engine Example
              62-20
62-21                
Contact Cisco Systems customer support team for more information.
on power-up.              
Troubleshooting the Test Failures
the POST tests.            
Page
              ROM Monitor
Entering the ROM Monitor              
ROM Monitor Commands
              ROM Monitor Command Descriptions
Configuration Register                
Changing the Configuration Register Manually
Changing the Configuration Register Using Prompts              
Console Download
Error Reporting              
Debug Commands
              Exiting the ROM Monitor
              Configuring WCCP Version 2 Services
About WCCP              
Hardware Acceleration
              Understanding WCCP Configuration
              WCCP Features
HTTP and Non-HTTP Services Support                
Multiple Routers Support
MD5 Security                
Web Content Packet Return
              Restrictions for WCCP
              Configuring WCCP
Configuring a Service Group Using WCCP            
Page
Specifying a Web Cache Service              
Using Access Lists for a WCCP Service Group
Setting a Password for a Router and Cache Engines              
Verifying and Monitoring WCCP Configuration Settings
              WCCP Configuration Examples
Performing a General WCCP Configuration Example                
Running a Web Cache Service Example
Running a Reverse Proxy Service Example              
Running TCP-Promiscuous Service Example
Running Redirect Access-List Example                
Using Access Lists Example
Setting a Password for a Switch and Content Engines Example                
64-12
              Verifying WCCP Settings Example
WCCP unicast mode                
WCCP multicast mode
            Page
            Page
              Configuring MIB Support
Determining MIB Support for Cisco IOS Releases              
Using Cisco IOS MIB Tools
Downloading and Compiling MIBs              
Guidelines for Working with MIBs
Downloading MIBs                
Compiling MIBs
              Enabling SNMP Support
            Page
            Page
APPENDIX              
A
Acronyms and Abbreviations            
Page
            Page
            Page
            Page
            Page
            Page
            Page
INDEX              
Numerics
A            
Page
            Page
              B
C            
Page
            Page
            Page
              D
            Page
            Page
              E
              F
              G
H                
I
            Page
            Page
            Page
              J
K                
L
            Page
              M
            Page
            Page
              N
              O
              P
            Page
            Page
            Page
              Q
              R
            Page
            Page
              S
            Page
            Page
            Page
            Page
              T
            Page
              U
              V
            Page
            Page
              W
Y