Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - Q - R - S - T - U - V - W - X -
Index
Numerics
802.1D
See STP
802.1Q
and trunk ports11-2
configuration limitations17-16
native VLAN for untagged traffic17-21
802.1S
See MSTP
802.1W
See RSTP
802.1X
See port-based authentication
802.3X flow control11-14
A
abbreviating commands2-4
AC (command switch)7-13, 7-24
access-class command29-20
access control entries
See ACEs
access control lists
See ACLs
access control parameter
See ACP
access-denied response, VMPS17-25
access groups, viewing29-23
accessing
clusters, switch7-16
command switches7-13
member switches7-16
switch clusters7-16
access lists
See ACLs
access ports
defined11-2
in switch clusters7-11
accounting
with RADIUS9-28
with TACACS+9-11, 9-17
ACEs
defined29-2
Ethernet29-2
IP29-2
Layer 3 parameters29-10
Layer 4 parameters29-10
ACLs
ACEs29-2
any keyword29-9
applying
time ranges to29-15
to management interfaces29-20
to management VLANs29-20
to physical interfaces29-21
to QoS30-5
to terminal lines29-20
classifying traffic for QoS30-25
comments in29-17
compiling29-23
ACLs (continued)
configuration guidelines
management interfaces, applying to29-6
physical interfaces, applying to29-6
defined29-2
displaying interface29-23
examples of29-23
extended IP
configuring for QoS classification30-26
creating29-10
matching criteria29-7
host keyword29-9
IP
creating29-7
implicit deny29-9, 29-13, 29-15
implicit masks29-9
management interfaces, applying to29-20
matching criteria29-2, 29-7
named29-13
physical interfaces, applying to29-21
undefined29-19, 29-21
virtual terminal lines, setting on29-20
MAC extended29-18
matching29-7
monitoring29-22
named29-13
numbers29-8
protocol parameters29-10
standard IP
configuring for QoS classification30-25
creating29-9
matching criteria29-7
time ranges29-15
unsupported features29-7
ACP
system-defined mask29-4
understanding29-4
user-defined mask29-4
addresses
displaying the MAC address table8-28
dynamic
accelerated aging14-8
changing the aging time8-23
default aging14-8
defined8-21
learning8-22
removing8-24
MAC, discovering8-28
multicast STP address management14-8
static
adding and removing8-26
defined8-21
address resolution8-28
Address Resolution Protocol
See ARP table
ADSL1-8
advertisements
CDP24-1
VTP17-17, 18-3
aggregated ports
See EtherChannel
aging, accelerating14-8
aging time
accelerated
for MSTP15-20
for STP14-8, 14-22
MAC address table8-23
maximum
for MSTP15-21
for STP14-22
alarms, RMON26-3
allowed-VLAN list17-19
American National Standards Institute
See ANSI
ANSI1-8
ARP table
address resolution8-28
managing8-28
asymmetric digital subscriber line
See ADSL
attributes, RADIUS
vendor-proprietary9-30
vendor-specific9-29
authentication
local mode with AAA9-31
NTP associations8-4
RADIUS
key9-21
login9-23
TACACS+
defined9-11
key9-13
login9-14
See also port-based authentication
authoritative time source, described8-2
authorization
with RADIUS9-27
with TACACS+9-11, 9-16
authorized ports with 802.1X10-4
autoconfiguration5-3
automatic discovery
adding member switches7-21
considerations
beyond a non-candidate device7-8, 7-10
brand new switches7-11
connectivity7-6
management VLANs7-8, 7-10
non-CDP-capable devices7-8
noncluster-capable devices7-8
automatic discovery (continued)
creating a cluster standby group7-23
in switch clusters7-6
See also CDP
automatic QoS
See QoS
automatic recovery, clusters7-12
See also HSRP
autonegotiation
interface configuration guidelines11-11
mismatches32-14
auxiliary VLAN
See voice VLAN
B
BackboneFast
described16-10
enabling16-20
support for1-5
banners
configuring
login8-21
message-of-the-day login8-20
default configuration8-19
when displayed8-19
blocking packets22-5
booting
boot loader, function of5-2
boot process5-1
manually5-14
specific image5-15
boot loader
accessing5-16
described5-2
environment variables5-16
prompt5-16
trap-door mechanism5-2
BPDU
error-disabled state16-3
RSTP format15-9
BPDU filtering
described16-3
enabling16-17
support for1-5
BPDU guard
described16-3
enabling16-16
support for1-5
broadcast storm control
configuring22-2
disabling22-3
browser configuration7-1
C
cables, monitoring for unidirectional links23-1
candidate switch
adding7-21
automatic discovery7-6
defined7-5
HC7-24
passwords7-21
requirements7-5
standby group7-23
See also command switch, cluster standby group, and member switch
Catalyst 2955
configuring alarm profiles
attaching an alarm profile to a port3-11
creating or modifying alarm profiles3-10
configuring switch alarms3-1to 3-12
configuring the FCS bit error rate alarm
setting the FCS error hysteresis threshold3-9
setting the FCS error threshold3-8
Catalyst 2955 (continued)
configuring the power supply alarm
setting the power mode3-5
setting the power supply alarm options3-6
configuring the temperature alarms
associating the temperature alarms to a relay3-7
setting a secondary temperature threshold3-7
default alarm configuration3-4, 3-5
displaying Catalyst 2955 switch alarms3-12
enabling SNMP traps3-12
FCS error hysteresis threshold3-2
global status monitoring alarms
power supply alarm3-2
temperature alarm3-2
port status monitoring alarms
FCS bit error rate alarm3-3
link fault alarm3-3
port is not operating alarm3-3
port not forwarding alarm3-3
triggering alarm options
configurable relays3-4
FCS Bit Error Rate alarm3-3
methods to trigger3-4
SNMP traps3-4
syslog messages3-4
cautionsxxviii
CC (command switch)7-24
CDP
and trusted boundary30-22
automatic discovery in switch clusters7-6
configuring24-2
default configuration24-2
described24-1
disabling for routing device24-3, 24-4
enabling and disabling
on an interface24-4
on a switch24-3
CDP (continued)
monitoring24-5
overview24-1
transmission timer and holdtime, setting24-2
updates24-2
CGMP, joining multicast group21-3
Cisco 575-LRE CPE1-8
Cisco Access Analog Trunk Gateway1-20
Cisco CallManager software1-15, 1-20
Cisco Discovery Protocol
See CDP
Cisco Intelligence Engine 2100 Series Configuration Registrar
See IE2100
Cisco IP Phones1-15
Cisco LRE 48 POTS Splitter (PS-1M-LRE-48)1-8, 1-17
Cisco Networking Services
See IE2100
Cisco SoftPhone software1-15
CiscoWorks 20001-9, 28-4
class maps for QoS
configuring30-28
described30-6
displaying30-37
class of service
See CoS
clearing interfaces11-19
CLI
abbreviating commands2-4
command modes2-1
described1-9
editing features
enabling and disabling2-7
keystroke editing2-7
wrapped lines2-8
error messages2-5
getting help2-3
CLI (continued)
history
changing the buffer size2-5
described2-5
disabling2-6
recalling commands2-6
managing clusters7-26
no and default forms of commands2-4
client mode, VTP18-3
clock
See system clock
clusters, switch
accessing7-16
adding member switches7-21
automatic discovery7-6
automatic recovery7-12
command switch configuration7-20
compatibility7-5
creating7-20
creating a cluster standby group7-23
described7-1
LRE profile considerations7-19
managing
through CLI7-26
through SNMP7-27
planning7-5
planning considerations
automatic discovery7-6
automatic recovery7-12
CLI7-26
host names7-16
IP addresses7-16
LRE profiles7-19
management VLAN7-19
passwords7-17
RADIUS7-18
SNMP7-17, 7-27
clusters, switch (continued)
planning considerations (continued)
switch-specific features7-20
TACACS+7-18
redundancy7-23
troubleshooting7-26
verifying7-25
See also candidate switch, command switch, cluster standby group, member switch, and standby command switch
cluster standby group
automatic recovery7-15
considerations7-14
creating7-23
defined7-2
requirements7-3
virtual IP address7-14
See also HSRP
CMS
advantages1-9
configuration modes4-5
described1-9
Front Panel view
described4-2
operating systems and supported browsers4-8
requirements4-9
Topology view4-14
wizards4-6
command-line interface
See CLI
command modes2-1
commands
abbreviating2-4
no and default2-4
setting privilege levels9-8
command switch
accessing7-13
active (AC)7-13, 7-24
command switch with HSRP disabled (CC)7-24
configuration conflicts32-14
defined7-2
enabling7-20
passive (PC)7-13, 7-24
password privilege levels7-27
priority7-13
recovery
from command-switch failure7-13
from failure32-10
from lost member connectivity32-14
redundant7-12, 7-23
replacing
with another switch32-13
with cluster member32-11
requirements7-3
standby (SC)7-13, 7-24
See also candidate switch, cluster standby group, member switch, and standby command switch
community strings
configuring7-17, 28-7
for cluster switches28-4
in clusters7-17
overview28-4
SNMP7-17
config.text5-13
configuration
controller for LRE upgrade13-25
global LRE13-25
configuration conflicts, recovering from lost member connectivity32-14
configuration examples, network
collapsed backbone and switch cluster1-15
design concepts
cost-effective wiring closet1-12
high-performance workgroup1-12
network performance1-11
network services1-11
redundant Gigabit backbone1-12
hotel network1-16
large campus1-20
long-distance, high-bandwidth transport configuration1-23
service-provider central-office network1-18
small to medium-sized network1-13
configuration files
clearing the startup configurationB-19
creating using a text editorB-10
default name5-13
deleting a stored configurationB-19
describedB-8
downloading
automatically5-13
preparingB-11, B-13, B-16
reasons forB-8
using FTPB-14
using RCPB-17
using TFTPB-11
guidelines for creating and usingB-9
invalid combinations when copyingB-5
limiting TFTP server access28-14
obtaining with DHCP5-7
password recovery disable considerations9-5
specifying the filename5-14
system contact and location information28-14
types and locationB-10
configuration files (continued)
uploading
preparingB-11, B-13, B-16
reasons forB-8
using FTPB-15
using RCPB-18
using TFTPB-12
VMPS database17-26
configuration modes, CMS4-5
configuration settings, saving5-10
configure terminal command11-5
configuring
duplex mode13-11
for an LRE upgrade13-24
LRE ports13-8
speed on Cisco 575 LRE CPE13-11
config-vlan mode2-2, 17-6
conflicts, configuration32-14
connections, secure remote9-33
connectivity problems32-15
consistency checks in VTP version 218-4
console port, connecting to2-10
conventions
commandxxviii
for examplesxxviii
textxxviii
CoS
configuring30-8
configuring priority queues30-35
defining30-9
described1-7
override priority19-5
trust priority19-6
CoS-to-DSCP map for QoS30-33
counters, clearing interface11-19
CPE 1-8
Ethernet link guidelines13-11
Ethernet links
connecting to LRE ports13-6
considerations for Cisco 575 LRE CPE13-11
considerations for Cisco 585 LRE CPE13-12
Ethernet links, described13-2
hotel network configuration example1-16, 1-18, 1-19
LRE links13-2
CPE link, transitioning state13-7
CPE toggle
configuring13-22
described13-7
disabling13-22
enabling13-22
crashinfo file32-22
cross-stack UplinkFast, STP
connecting stack ports16-8
described16-5
enabling16-19
fast-convergence events16-7
Fast Uplink Transition Protocol16-6
limitations16-8
normal-convergence events16-7
Stack Membership Discovery Protocol16-6
support for1-5
cross talk13-10
cryptographic software image9-32
customer premises equipment
See CPE
D
daylight saving time8-14
debugging
enabling all system diagnostics32-20
enabling for a specific feature32-20
redirecting error message output32-21
using commands32-19
default commands2-4
default configuration
802.1X10-8
banners8-19
booting5-13
CDP24-2
DHCP20-3
DNS8-18
EtherChannel31-8
IGMP filtering21-23
IGMP snooping21-6
IGMP throttling21-23
initial switch information5-3
Layer 2 interfaces11-10
MAC address table8-23
MSTP15-12
MVR21-17
NTP8-4
optional spanning-tree features16-14
password and privilege level9-2
QoS30-16
RADIUS9-20
RMON26-3
RSPAN25-7
SNMP28-6
SPAN25-7
STP14-11
system message logging27-3
system name and prompt8-16
TACACS+9-13
UDLD23-4
VLAN, Layer 2 Ethernet interfaces17-17
VLANs17-7
VMPS17-28
voice VLAN19-2
VTP18-6
default gateway5-10
deleting VLANs17-10
description command11-16
destination addresses, in ACLs29-12
detecting indirect link failures, STP16-10
device discovery protocol24-1
Device Manager4-14
See also Switch Manager
DHCP1-4
DHCP-based autoconfiguration
client request message exchange5-4
configuring
client side5-3
DNS5-6
relay device5-6
server-side5-5
TFTP server5-6
example5-8
lease options
for IP address information5-5
for receiving the configuration file5-5
overview5-3
relationship to BOOTP5-3
DHCP option 82
configuration guidelines20-3
default configuration20-3
displaying20-5
overview20-2
DHCP snooping
configuration guidelines20-3
default configuration20-3
displaying binding tables20-5
displaying configuration20-5
message exchange process20-2
option 82 data insertion20-2
Differentiated Services architecture, QoS30-2
Differentiated Services Code Point30-3
digital telephone networks1-8
directories
changingB-4
creating and removingB-4
displaying the workingB-4
discovery, clusters
See automatic discovery
DNS
and DHCP-based autoconfiguration5-6
default configuration8-18
displaying the configuration8-19
overview8-17
setting up8-18
documentation, relatedxxix
domain names
DNS8-17
VTP18-8
Domain Name System
See DNS
downloading
configuration files
preparingB-11, B-13, B-16
reasons forB-8
using FTPB-14
using RCPB-17
using TFTPB-11
image files
deleting old imageB-23
preparingB-21, B-25, B-29
reasons forB-19
using FTPB-26
using RCPB-30
using TFTPB-22
DSCP1-7, 30-3
DSCP-to-CoS map for QoS30-34
DTP1-5, 17-15
duplex mode
configuring13-11
CPE Ethernet link13-11
duplex mode, configuring11-11
dynamic access ports
characteristics17-3
configuring17-29
defined11-2
dynamic addresses
See addresses
dynamic desirable trunking mode17-16
dynamic port VLAN membership
described17-26
reconfirming17-30
troubleshooting17-32
types of connections17-29
VMPS database configuration file17-26
Dynamic Trunking Protocol
See DTP
E
editing features
enabling and disabling2-7
keystrokes used2-7
wrapped lines2-8
egress port scheduling30-9
enable password9-4
enable secret password9-4
encapsulation30-8
encryption for passwords9-4
environment variables
function of5-17
location in Flash5-16
error messages
during command entry2-5
setting the display destination device27-4
severity levels27-8
system message format27-2
EtherChannel
automatic creation of31-3
configuration guidelines31-8
default configuration31-8
destination MAC address forwarding31-6
displaying status31-14
forwarding methods31-11
interaction with STP31-8
EtherChannel (continued)
Layer 2 interfaces, configuring31-9
load balancing31-6, 31-11
number of interfaces per31-2
overview31-1
PAgP
aggregate-port learners31-5
compatibility with Catalyst 190031-12
displaying status31-14
interaction with other features31-6
learn method and priority configuration31-12
modes31-3
overview31-3
silent mode31-4
support for1-3
port-channel interfaces
described31-2
numbering of31-2
port groups11-3
source MAC address forwarding31-6
EtherChannel guard
described16-12
enabling16-20
Ethernet VLANs
adding17-8
defaults and ranges17-8
modifying17-8
ETSI1-8
European Telecommunication Standards Institute
See ETSI
events, RMON26-3
examples
conventions forxxviii
network configuration1-10
expedite queue, QoS30-9
expert mode4-6
Express Setup4-11
extended-range VLANs
configuration guidelines17-12
configuring17-12
creating17-12, 17-13
defined17-1
extended system ID
MSTP15-14
STP14-3, 14-14
Extensible Authentication Protocol over LAN10-1
F
fallback VLAN name17-26
Fast Uplink Transition Protocol16-6
features, Cisco IOS1-2
fiber-optic, detecting unidirectional links23-1
files
copyingB-5
deletingB-5
displaying the contents ofB-8
tar
creatingB-6
displaying the contents ofB-7
extractingB-7
image file formatB-20
files, crashinfo
description32-22
displaying the contents of32-23
location32-23
file system
displaying available file systemsB-2
displaying file informationB-3
local file system namesB-1
network file system namesB-5
setting the defaultB-3
filtering show and more command output2-9
filters, IP
See ACLs, IP
Flash device, number ofB-1
flooded traffic, blocking22-6
flow-based packet classification1-7
flow control11-14
forward-delay time
MSTP15-20
STP14-5, 14-22
forwarding
See broadcast storm control
FTP
configuration files
downloadingB-14
overviewB-12
preparing the serverB-13
uploadingB-15
image files
deleting old imageB-27
downloadingB-26
preparing the serverB-25
uploadingB-27
FTP, accessing MIB filesA-3
G
GBICs
1000BASE-LX/LH module1-12
1000BASE-SX module1-12
1000BASE-ZX module1-12
GigaStack module1-12
security and identification32-15
get-bulk-request operation28-3
get-next-request operation28-3, 28-4
get-request operation28-3, 28-4
get-response operation28-3
Gigabit Interface Converters
See GBICs
GigaStack GBIC
fast transition of redundant link16-5
See also GBICs
global configuration mode2-2
guide
audiencexxvii
purposexxvii
guide mode4-5
H
HC (candidate switch)7-24
hello time
MSTP15-19
STP14-21
help, for the command line2-3
history
changing the buffer size2-5
described2-5
disabling2-6
recalling commands2-6
history table, level and number of syslog messages27-10
host names
abbreviations appended to7-24
in clusters7-16
hosts, limit on dynamic ports17-32
HP OpenView1-9
HSRP
automatic cluster recovery7-15
cluster standby group considerations7-14
See also clusters, cluster standby group, and standby command switch
I
ICMP ping
executing32-16
overview32-15
IDS, using with SPAN and RSPAN25-2
IE2100
CNS embedded agents
described6-5
enabling automated configuration6-6
enabling configuration agent6-9
enabling event agent6-8
Configuration Registrar
configID, deviceID, hostname6-3
configuration service6-2
described6-1
event service6-3
described1-9
support for1-4
IEEE 802.1P19-1
IGMP
joining multicast group21-3
join messages21-3
leave processing, enabling21-10
leaving multicast group21-4
queries21-3
report suppression
described21-5
disabling21-11
throttling action21-22
IGMP filtering
configuring21-23
default configuration21-23
described21-22
monitoring21-27
IGMP groups
configuring the throttling action21-26
setting the maximum number21-25
IGMP profile
applying21-24
configuration mode21-23
configuring21-23
IGMP snooping
configuring21-6
default configuration21-6
definition21-1
enabling and disabling21-7
global configuration21-7
Immediate Leave21-5
method21-8
monitoring21-13
VLAN configuration21-7
IGMP throttling
configuring21-26
default configuration21-23
described21-22
displaying action21-27
Immediate-Leave, IGMP21-5
ingress port scheduling30-8
Integrated Services Digital Network
See ISDN
Intelligence Engine 2100 Series CNS Agents
See IE2100
interface
number11-4
range macros11-8
interface command11-4, 11-5
interface configuration mode2-3
interfaces
Cisco IOS supported1-9
configuration guidelines11-11
configuring11-5
configuring duplex mode11-11
configuring speed11-11
counters, clearing11-19
described11-16
descriptive name, adding11-16
displaying information about11-17
flow control11-14
interfaces (continued)
monitoring11-16
naming11-16
physical, identifying11-4
range of11-6
restarting11-19
shutting down11-19
supported11-9
types of11-1
interfaces range macro command11-8
interleave delay, LRE13-20
Intrusion Detection System
See IDS
inventory, cluster7-25
IOS command-line interface
See CLI
IP
named extended ACL29-14
named standard ACL29-14
numbered extended ACL29-10
numbered standard ACL29-9
IP ACLs
applying to
management interfaces29-20
physical interfaces29-21
extended, creating29-10
for QoS classification30-25
implicit deny29-9, 29-13, 29-15
implicit masks29-9
management interfaces, applying to29-20
named29-13
physical interfaces, applying to29-21
standard, creating29-9
undefined29-19, 29-21
virtual terminal lines, setting on29-20
IP addresses
candidate or member7-5, 7-16
cluster access7-2
command switch7-3, 7-13, 7-16
discovering8-28
management VLAN7-19
redundant clusters7-13
standby command switch7-13, 7-16
See also IP information
ip igmp profile command21-23
IP information
assigned
manually5-10
through DHCP-based autoconfiguration5-3
default configuration5-3
IP multicast routing and IGMP snooping21-1, 21-6
IP phones
and QoS19-1
automatic classification and queueing30-10
configuring19-3
trusted boundary for QoS30-21
IP protocols in ACLs29-12
IPv41-1
IPv61-1
IP version 41-1
IP version 61-1
ISDN1-8
J
Java plug-in configuration7-1
join messages, IGMP21-3
L
LACP
See EtherChannel
Layer 2 frames, classification with CoS30-2
Layer 2 interfaces, default configuration11-10
Layer 2 traceroute
and ARP32-17
and CDP32-17
described32-17
IP addresses and subnets32-17
MAC addresses and VLANs32-17
multicast traffic32-17
multiple devices on a port32-18
unicast traffic32-17
usage guidelines32-17
Layer 2 trunks17-15
Layer 3 packets, classification methods30-3
Layer 3 parameters of ACEs29-10
Layer 4 parameters of ACEs29-10
LDAP6-2
leave processing, IGMP21-10
lightweight directory access protocol
See LDAP
line configuration mode2-3
link
qualification of13-16
SNR13-16
link guidelines, CPE Ethernet13-11
link monitor, LRE13-20
links, unidirectional23-1
login authentication
with RADIUS9-23
with TACACS+9-14
login banners8-19
log messages
See system message logging
loop guard
described16-13
enabling16-21
support for1-5
LRE environment
guidelines13-9
troubleshooting32-18
LRE interleave delay13-20
LRE link
monitor13-20
persistence13-19
LRE links
See LRE ports
LRE message logging13-8
LRE ports
configuring
assigning a global sequence13-13
assigning a port sequence13-14
assigning a private profile13-13
assigning a public profile13-12
assigning the default profile13-13
CPE Ethernet links
Cisco 575 LRE CPE considerations13-11
Cisco 585 LRE CPE considerations13-12
described13-2, 13-6
duplex mode13-11
flow control13-11
speed13-11
statistics13-7
described13-1
link qualification13-16
LRE links
considerations13-9
described13-2
statistics13-11
preventing loss of data13-11
rate selection
described13-14
sequences13-5
troubleshooting32-18
LRE profiles
assigning
global profiles13-13
port sequences13-14
private profiles13-13
public profiles13-12
considerations13-10
described13-2
rate selection13-14
table of13-3, 13-4
See also LRE ports and CPE
LRE profiles, considerations in switch clusters7-19
lre shutdown command13-6
LRE switch, upgrading firmware13-23
LRE technology13-1
See also LRE ports and CPE
LRE upstream power back-off13-21
M
MAC addresses
aging time8-23
and VLAN association8-22
building the address table8-22
default configuration8-23
discovering8-28
displaying8-28
displaying in DHCP snooping binding table20-5
dynamic
learning8-22
removing8-24
in ACLs29-18
static
adding8-26
allowing8-27
characteristics of8-26
dropping8-27
removing8-26
sticky secure, adding22-7
MAC address multicast entries, monitoring21-14
MAC address-to-VLAN mapping17-25
MAC extended access lists29-18
macros
See SmartPort macros
management options
benefits
clustering1-9
CMS1-9
CLI2-1
CNS6-1
overview1-9
management VLAN
changing7-19
considerations in switch clusters7-8, 7-10, 7-19
discovery through different management VLANs7-10
discovery through same management VLAN7-8
IP address7-19
MANs
CWDM configuration example1-23
long-distance, high-bandwidth transport configuration example1-23
mapping tables for QoS
configuring
DSCP30-32
DSCP-to-CoS30-34
described30-5
matching, ACLs29-7
maximum aging time
MSTP15-21
STP14-22
maximum hop count, MSTP15-21
membership mode, VLAN port17-3
member switch
adding7-21
automatic discovery7-6
defined7-2
member switch (continued)
managing7-26
passwords7-16
recovering from lost connectivity32-14
requirements7-5
See also candidate switch, cluster standby group, and standby command switch
menu bar, variations4-4
message logging, LRE13-8
messages to users through banners8-19
metropolitan-area networks
See MANs
MIBs
accessing files with FTPA-3
location of filesA-3
overview28-1
SNMP interaction with28-4
supportedA-1
microfilters, phone1-17, 1-19, 13-10
mini-point-of-presence
See POP
mirroring traffic for analysis25-1
mismatches, autonegotiation32-14
monitoring
access groups29-23
ACLs29-22
cables for unidirectional links23-1
CDP24-5
IGMP
filters21-27
snooping21-13
interfaces11-16
multicast router interfaces21-13
MVR21-21
network traffic for analysis with probe25-1
port protection22-14
speed and duplex mode11-13
traffic flowing among switches26-1
traffic suppression22-14
monitoring (continued)
VLANs17-14
VMPS17-31
VTP18-15, 18-16
MSTP
boundary ports
configuration guidelines15-13
described15-5
BPDU filtering
described16-3
enabling16-17
BPDU guard
described16-3
enabling16-16
CIST, described15-3
configuration guidelines15-12, 16-14
configuring
forward-delay time15-20
hello time15-19
link type for rapid convergence15-22
maximum aging time15-21
maximum hop count15-21
MST region15-13
path cost15-18
port priority15-17
root switch15-14
secondary root switch15-16
switch priority15-19
CST
defined15-3
operations between regions15-4
default configuration15-12
default optional feature configuration16-14
displaying status15-23
enabling the mode15-13
EtherChannel guard
described16-12
enabling16-20
MSTP (continued)
extended system ID
effects on root switch15-14
effects on secondary root switch15-16
unexpected behavior15-15
instances supported14-9
interface state, blocking to forwarding16-2
interoperability and compatibility among modes14-10
interoperability with 802.1D
described15-5
restarting migration process15-22
IST
defined15-3
master15-3
operations within a region15-3
loop guard
described16-13
enabling16-21
mapping VLANs to MST instance15-13
MST region
CIST15-3
configuring15-13
described15-2
hop-count mechanism15-5
IST15-3
supported spanning-tree instances15-2
overview15-2
Port Fast
described16-2
enabling16-15
preventing root switch selection16-12
root guard
described16-12
enabling16-21
root switch
configuring15-15
effects of extended system ID15-14
unexpected behavior15-15
shutting down Port Fast-enabled port16-16
multicast groups
and IGMP snooping21-6
Immediate Leave21-5
joining21-3
leaving21-4
static joins21-9
multicast packets
blocking22-6
multicast router interfaces, monitoring21-13
multicast router ports, adding21-9
Multicast VLAN Registration
See MVR
Multiple Spanning Tree Protocol
See MSTP
MVR
configuring interfaces21-19
default configuration21-17
described21-14
modes21-18
monitoring21-21
setting global parameters21-18
N
named IP ACLs29-13
NameSpace Mapper
See NSM
native VLAN
configuring17-21
default17-21
network examples
collapsed backbone and switch cluster1-15
design concepts
cost-effective wiring closet1-12
high-performance workgroup1-12
network performance1-11
network services1-11
redundant Gigabit backbone1-12
hotel network1-16
network examples (continued)
large campus1-20
long-distance, high-bandwidth transport configuration1-23
service-provider central-office network1-18
small to medium-sized network1-13
network management
CDP24-1
RMON26-1
SNMP28-1
Network Time Protocol
See NTP
no commands2-4
nonhomologated POTS splitter
See Cisco LRE POTS Splitter (PS-1M-LRE-48)
nontrunking mode17-16
normal-range VLANs
configuration modes17-6
defined17-1
NSM6-3
NTP
associations
authenticating8-4
defined8-2
enabling broadcast messages8-7
peer8-6
server8-6
default configuration8-4
displaying the configuration8-11
overview8-2
restricting access
creating an access group8-9
disabling NTP services per interface8-10
source IP address, configuring8-10
stratum8-2
synchronizing devices8-6
time
services8-2
synchronizing8-2
O
out-of-profile markdown1-7
P
PAgP
See EtherChannel
pass-through mode30-23
passwords
default configuration9-2
disabling recovery of9-5
encrypting9-4
in clusters7-17, 7-21
overview9-1
recovery of32-2
setting
enable9-3
enable secret9-4
Telnet9-6
with usernames9-7
VTP domain18-8
patch panel1-17
path cost
MSTP15-18
STP14-19
PBX1-16
PC (passive command switch)7-13, 7-24
performing an LRE upgrade13-24
persistence, LRE link13-19
per-VLAN spanning-tree plus
See PVST+
physical ports11-1
PIM-DVMRP, as snooping method21-8
ping
character output description32-16
executing32-16
overview32-15
plain old telephone service
See POTS splitters and POTS telephones
policers
configuring for each matched traffic class30-29
described30-4
number of1-7, 30-7
types of30-7
policing1-7, 30-4
policy maps for QoS
characteristics of30-29
configuring30-29
described30-6
displaying30-37
POP1-21
Port Aggregation Protocol
See EtherChannel
See PAgP
port-based authentication
authentication server
defined10-2
RADIUS server10-2
client, defined10-2
configuration guidelines10-9
configuring
802.1X authentication10-10
guest VLAN10-16
host mode10-16
manual re-authentication of a client10-13
periodic re-authentication10-13
quiet period10-14
RADIUS server10-13
RADIUS server parameters on the switch10-12
switch-to-client frame-retransmission number10-15
switch-to-client retransmission time10-14
default configuration10-8
described10-1
device roles10-2
displaying statistics10-18
EAPOL-start frame10-3
port-based authentication (continued)
EAP-request/identity frame10-3
EAP-response/identity frame10-3
enabling
802.1X with guest VLAN10-7
802.1X with port security10-5, 10-16
802.1X with VLAN assignment10-6, 10-10
802.1X with voice VLAN10-6
encapsulation10-2
initiation and message exchange10-3
method lists10-10
ports
authorization state and dot1x port-control command10-4
authorized and unauthorized10-4
resetting to default values10-17
software upgrade changes10-10
switch
as proxy10-2
RADIUS client10-2
topologies, supported10-4
port blocking22-5
port-channel
See EtherChannel
Port Fast
described16-2
enabling16-15
mode, spanning tree17-28
support for1-5
port membership modes, VLAN17-3
port priority
MSTP15-17
STP14-17
port profile, locking13-15
ports
access11-2
blocking22-5
duplex mode13-11
dynamic access17-3
forwarding, resuming22-6
LRE13-1
priority30-8
protected22-4
secure22-7
speed, setting and checking13-11
static-access17-3, 17-11
switch11-1
trunks17-15
VLAN assignments17-11
See also CPE
See also LRE ports
port scheduling30-8
port security
aging22-12
configuring22-10
default configuration22-9
described22-7
displaying22-14
sticky learning22-7
violations22-8
with other features22-9
port-shutdown response, VMPS17-25
POTS splitters
homologated1-17
nonhomologated1-17
See also Cisco LRE 48 POTS Splitter (PS-1M-LRE-48)
POTS telephones1-16, 1-19, 13-10
precedence13-15
preferential treatment of traffic
See QoS
preventing unauthorized access9-1
priority
overriding CoS19-5
port, described30-8
trusting CoS19-6
private branch exchange
See PBX
private LRE profiles, assigning13-13
private VLAN edge ports
See protected ports
privileged EXEC mode2-2
privilege levels
changing the default for lines9-9
command switch7-27
exiting9-10
logging into9-10
mapping on member switches7-27
overview9-2, 9-8
setting a command with9-8
profile acquisition, automatic13-14
profile locking13-15
profiles, LRE
considerations13-10
default, assigning13-13
described13-2
private, assigning13-13
public, assigning13-12
rate selection13-14
See also LRE ports and CPE
protected ports1-3, 22-4
pruning, VTP
enabling18-14
enabling on a port17-20
examples18-5
overview18-4
pruning-eligible list
changing17-20
for VTP pruning18-4
VLANs18-14
PSTN1-8, 1-17, 1-20
publications, relatedxxix
public LRE profiles, assigning13-12
Public Switched Telephone Network
See PSTN
PVST+
802.1Q trunking interoperability14-10
described14-9
instances supported14-9
Q
QoS
auto-QoS
configuration and defaults display30-13
displaying30-13
effects on NVRAM configuration30-12
example, configuration30-14
basic model30-4
classification
class maps, described30-6
defined30-4
in frames and packets30-3
IP ACLs, described30-5
MAC ACLs, described30-5
pass-through mode, described30-23
policy maps, described30-6
port default, described30-5
trust DSCP, described30-5
trusted boundary, described30-21
trusted CoS, described30-5
types for IP traffic30-5
types for non-IP traffic30-5
class maps
configuring30-28
displaying30-37
QoS (continued)
configuration examples
auto-QoS30-14
common wiring closet30-38
intelligent wiring closet30-39
configuration guidelines30-17
configuring
class maps30-28
CoS and WRR30-35
default port CoS value30-21
egress queues30-35
IP extended ACLs30-26
IP standard ACLs30-25
MAC ACLs30-27
policy maps30-29
port trust states within the domain30-18
QoS policy30-24
trusted boundary30-22
default configuration30-16
displaying statistics30-37
egress port scheduling30-9
enabling expedite queue30-36
expedite queue
described30-9
enabling30-36
ingress port scheduling30-8, 30-9
IP phones
automatic classification and queueing30-10
detection and trusted settings30-10
IP phones, detection and trusted settings30-21
mapping tables
CoS-to-DSCP30-33
displaying30-37
DSCP-to-CoS30-34
types of30-5
marked-down actions30-31
marking, described30-4, 30-7
overview30-2
pass-through mode30-23
QoS (continued)
policers
configuring30-31
described30-7
number of30-7
types of30-7
policing, described30-4, 30-7
policy maps
characteristics of30-29
configuring30-29
displaying30-37
queueing, defined30-4
scheduling, defined30-4
support for1-7
trusted bounday30-21
trust states30-5
understanding30-2
qualification, link13-16
quality of service
See QoS
queries, IGMP21-3
R
RADIUS
attributes
vendor-proprietary9-30
vendor-specific9-29
configuring
accounting9-28
authentication9-23
authorization9-27
communication, global9-21, 9-29
communication, per-server9-20, 9-21
multiple UDP ports9-21
default configuration9-20
defining AAA server groups9-25
displaying the configuration9-31
identifying the server9-20
RADIUS (continued)
in clusters7-18
limiting the services to the user9-27
method list, defined9-20
operation of9-19
overview9-18
suggested network environments9-18
tracking services accessed by user9-28
range
macro11-8
of interfaces11-6
rapid convergence15-7
rapid per-VLAN spanning-tree plus
See rapid PVST+
rapid PVST+
802.1Q trunking interoperability14-10
described14-9
instances supported14-9
rapid-PVST+17-2
Rapid Spanning Tree Protocol
See RSTP
rate selection
definition of13-14
sequences13-5
rate selections, list of sequences13-5, 13-6
rcommand command7-26
RCP
configuration files
downloadingB-17
overviewB-16
preparing the serverB-16
uploadingB-18
image files
deleting old imageB-32
downloadingB-30
preparing the serverB-29
uploadingB-32
reconfirmation interval, VMPS, changing17-30
recovery procedures32-1
redundancy
EtherChannel31-2
STP
backbone14-7
multidrop backbone16-5
path cost17-23
port priority17-22
redundant clusters
See cluster standby group
redundant links and UplinkFast16-18
reloading software5-18
Remote Authentication Dial-In User Service
See RADIUS
Remote Copy Protocol
See RCP
remote monitoring
see RMON
Remote Network Monitoring
See RMON
report suppression, IGMP
described21-5
disabling21-11
resetting a UDLD-shutdown interface23-6
restricting access
NTP services8-8
overview9-1
passwords and privilege levels9-2
RADIUS9-18
TACACS+9-10
retry count, VMPS, changing17-31
RFC
1112, IP multicast and IGMP21-2
1157, SNMPv128-2
1305, NTP8-2
1757, RMON26-2
1901, SNMPv2C28-2
1902 to 1907, SNMPv228-2
2236, IP multicast and IGMP21-2
2273-2275, SNMPv328-2
RMON
default configuration26-3
displaying status26-6
enabling alarms and events26-3
groups supported26-2
overview26-1
statistics
collecting group Ethernet26-5
collecting group history26-5
root guard
described16-12
enabling16-21
support for1-5
root switch
MSTP15-14
STP14-14
RSPAN
configuration guidelines25-12
default configuration25-7
destination ports25-4
displaying status25-17
IDS25-2
interaction with other features25-6
monitored ports25-4
monitoring ports25-4
overview1-7, 25-1
received traffic25-3
reflector port25-5
session limits25-7
sessions
creating25-13
defined25-3
removing source (monitored) ports25-16
specifying monitored ports25-13
source ports25-4
transmitted traffic25-3
RSTP
active topology, determining15-6
BPDU
format15-9
processing15-10
designated port, defined15-6
designated switch, defined15-6
interoperability with 802.1D
described15-5
restarting migration process15-22
topology changes15-10
overview15-6
port roles
described15-6
synchronized15-8
proposal-agreement handshake process15-7
rapid convergence
described15-7
edge ports and Port Fast15-7
point-to-point links15-7, 15-22
root ports15-7
root port, defined15-6
See also MSTP
running configuration, saving5-10
S
SC (standby command switch)7-13, 7-24
scheduled reloads5-18
secure ports, configuring22-7
secure remote connections9-33
Secure Shell
See SSH
security, port22-7
sequence numbers in log messages27-8
sequences, LRE
global, assigning13-13
specific port, assigning13-14
sequences, table of13-5, 13-6
server mode, VTP18-3
servers, BOOTP1-4
service-provider network, MSTP and RSTP15-1
set-request operation28-4
settings
duplex mode13-11
speed13-11
set-top box, television1-16, 1-19
setup program, failed command switch replacement32-11, 32-13
severity levels, defining in system messages27-8
show and more command output, filtering2-9
show cdp traffic command24-5
show cluster members command7-26
show configuration command11-16
show controllers ethernet-controller command13-7
show controllers lre commands13-11, 13-12, 13-13, 13-14
show controllers lre profile mapping3-7, 3-10, 3-11, 3-12, 13-13, 13-14, 13-16, 13-19, 13-21, 13-22
show controllers lre profile mapping command13-12, 13-13
show interfaces command11-13, 11-16
show running-config command
displaying ACLs29-19, 29-20, 29-21
interface description in11-16
shutdown command on interfaces11-19
signal to noise ratio13-16
Simple Network Management Protocol
See SNMP
SmartPort macros
configuration guidelines12-2
creating and applying12-3
default configuration12-2
defined12-1
displaying12-4
tracing12-2
SNAP24-1
SNMP
accessing MIB variables with28-4
agent
described28-4
disabling28-7
community strings
configuring28-7
for cluster switches28-4
overview28-4
configuration examples28-15
default configuration28-6
groups28-9
in clusters7-17
informs
and trap keyword28-11
described28-5
differences from traps28-5
enabling28-13
limiting access by TFTP servers28-14
limiting system log messages to NMS27-10
manager functions28-3
managing clusters with7-27
MIBs
location ofA-3
supportedA-1
notifications28-5
overview28-1, 28-4
status, displaying28-16
system contact and location28-14
trap manager, configuring28-12
traps
described28-3, 28-5
differences from informs28-5
enabling28-11
enabling MAC address notification8-24
overview28-1, 28-4
types of28-11
users28-9
versions supported28-2
snooping, IGMP21-1
SNR
definition of13-16
downstream rate requirements13-16, 13-18
margins13-16
upstream rate requirements13-17, 13-18
software, VLAN considerations18-8
software images
location in FlashB-20
recovery procedures32-2
scheduling reloads5-18
tar file format, describedB-20
See also downloading and uploading
source addresses, in ACLs29-12
SPAN
configuration guidelines25-8
default configuration25-7
destination ports25-4
displaying status25-17
IDS25-2
interaction with other features25-6
monitored ports25-4
monitoring ports25-4
overview1-7, 25-1
received traffic25-3
session limits25-7
sessions
creating25-8
defined25-3
removing destination (monitoring) ports25-11
removing source (monitored) ports25-11
specifying monitored ports25-8
source ports25-4
transmitted traffic25-3
spanning tree and native VLANs17-17
Spanning Tree Protocol
See STP
speed
configuring on interfaces11-11
setting on CPE devices13-11
SSH
configuring9-34
cryptographic software image9-32
described9-33
encryption methods9-33
user authentication methods, supported9-33
Stack Membership Discovery Protocol16-6
Standby Command Configuration window7-25
standby command switch
configuring 7-23
considerations7-14
defined7-2
priority7-13
requirements7-3
virtual IP address7-14
See also cluster standby group and HSRP
standby group, cluster
See cluster standby group and HSRP
startup configuration
booting
manually5-14
specific image5-15
clearingB-19
configuration file
automatically downloading5-13
specifying the filename5-14
default boot configuration5-13
static access ports
assigning to VLAN17-11
defined11-2, 17-3
static addresses
See addresses
static VLAN membership17-2
statistics
802.1X10-18
CDP24-5
interface11-17
QoS ingress and egress30-37
RMON group Ethernet26-5
RMON group history26-5
SNMP input and output28-16
VTP18-15
sticky learning
configuration file22-7
defined22-7
disabling22-7
enabling22-7
saving addresses22-7
storm control
described22-1
displaying22-14
STP
accelerating root port selection16-4
BackboneFast
described16-10
enabling16-20
BPDU filtering
described16-3
enabling16-17
BPDU guard
described16-3
enabling16-16
BPDU message exchange14-2
configuration guidelines14-11, 16-14
configuring
forward-delay time14-22
hello time14-21
in cascaded stack14-23
maximum aging time14-22
path cost14-19
port priority14-17
root switch14-14
STP (continued)
configuring (continued)
secondary root switch14-16
spanning-tree mode14-12
switch priority14-20
counters, clearing14-24
cross-stack UplinkFast
described16-5
enabling16-19
default configuration14-11
default optional feature configuration16-14
designated port, defined14-3
designated switch, defined14-3
detecting indirect link failures16-10
disabling14-13
displaying status14-24
EtherChannel guard
described16-12
enabling16-20
extended system ID
affects on root switch14-14
affects on the secondary root switch14-16
overview14-3
unexpected behavior14-15
features supported1-5
inferior BPDU14-3
instances supported14-9
interface state, blocking to forwarding16-2
interface states
blocking14-5
disabled14-6
forwarding14-5, 14-6
learning14-6
listening14-6
overview14-4
interoperability and compatibility among modes14-10
limitations with 802.1Q trunks14-10
STP (continued)
load sharing
overview17-21
using path costs17-23
using port priorities17-22
loop guard
described16-13
enabling16-21
modes supported14-9
multicast addresses, affect of14-8
overview14-2
path costs17-23, 17-24
Port Fast
described16-2
enabling16-15
port priorities17-22
preventing root switch selection16-12
protocols supported14-9
redundant connectivity14-7
root guard
described16-12
enabling16-21
root port, defined14-3
root switch
affects of extended system ID14-3, 14-14
configuring14-14
election14-3
unexpected behavior14-15
settings in a cascaded stack14-23
shutting down Port Fast-enabled port16-16
superior BPDU14-3
timers, described14-21
UplinkFast
described16-4
enabling16-18
stratum, NTP8-2
summer time8-14
SunNet Manager1-9
switch clustering technology
See clusters, switch
switched ports11-1
Switch Manager4-14
See also Device Manager
switchport block multicast command22-6
switchport block unicast command22-6
switchport protected command22-4
switch priority
MSTP15-19
STP14-20
syslog
See system message logging
syslog export
and LRE logging13-8
described13-8
disabling13-23
enabling13-22
system clock
configuring
daylight saving time8-14
manually8-12
summer time8-14
time zones8-13
displaying the time and date8-12
overview8-1
See also NTP
system message logging
default configuration27-3
defining error message severity levels27-8
disabling27-4
displaying the configuration27-12
enabling27-4
facility keywords, described27-12
level keywords, described27-9
limiting messages27-10
message format27-2
overview27-1
sequence numbers, enabling and disabling27-8
system message logging (continued)
setting the display destination device27-4
synchronizing log messages27-6
time stamps, enabling and disabling27-7
UNIX syslog servers
configuring the daemon27-11
configuring the logging facility27-11
facilities supported27-12
system name
default configuration8-16
default setting8-16
manual configuration8-16
See also DNS
system prompt
default setting8-16
manual configuration8-17
T
TACACS+
accounting, defined9-11
authentication, defined9-11
authorization, defined9-11
configuring
accounting9-17
authentication key9-13
authorization9-16
login authentication9-14
default configuration9-13
displaying the configuration9-17
identifying the server9-13
in clusters7-18
limiting the services to the user9-16
operation of9-12
overview9-10
tracking services accessed by user9-17
tar files
creatingB-6
displaying the contents ofB-7
extractingB-7
image file formatB-20
Telnet
accessing management interfaces2-10
accessing the CLI1-9
from a browser2-10
setting a password9-6
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password9-6
TFTP
configuration files
downloadingB-11
preparing the serverB-11
uploadingB-12
configuration files in base directory5-6
configuring for autoconfiguration5-6
image files
deletingB-23
downloadingB-22
preparing the serverB-21
uploadingB-24
limiting access by servers28-14
time
See NTP and system clock
time-range command29-15
time ranges in ACLs29-15
time stamps in log messages27-7
time zones8-13
Token Ring VLANs
support for17-5
VTP support18-4
Topology view
described4-2, 4-14
TOS1-7
traceroute, Layer 2
and ARP32-17
and CDP32-17
described32-17
IP addresses and subnets32-17
MAC addresses and VLANs32-17
multicast traffic32-17
multiple devices on a port32-18
unicast traffic32-17
usage guidelines32-17
traffic
blocking flooded22-5
fragmented29-3
unfragmented29-3
traffic policing1-7
transparent mode, VTP18-3, 18-12
trap-door mechanism5-2
traps
configuring MAC address notification8-24
configuring managers28-11
defined28-3
enabling8-24, 28-11
notification types28-11
overview28-1, 28-4
troubleshooting
connectivity problems32-15
detecting unidirectional links23-1
displaying crash information32-22
GBIC security and identification32-15
LRE ports32-18
with CiscoWorks28-4
with debug commands32-19
with ping32-15
with system message logging27-1
trunk ports
configuring17-18
defined11-2
trunks
allowed-VLAN list17-19
load sharing
setting STP path costs17-23
using STP port priorities17-22
native VLAN for untagged traffic17-21
parallel17-23
pruning-eligible list17-20
to non-DTP device17-15
understanding17-15
VLAN 1 minimization17-19
trusted boundary30-21
twisted-pair Ethernet, detecting unidirectional links23-1
type-of-service
See TOS
U
UDLD
default configuration23-4
echoing detection mechanism23-3
enabling
globally23-5
per interface23-5
link-detection mechanism23-1
neighbor database23-2
overview23-1
resetting an interface23-6
status, displaying23-7
unauthorized ports with 802.1X10-4
unicast MAC address filtering
and adding static addresses8-27
and broadcast MAC addresses8-27
and CPU packets8-27
and multicast addresses8-27
and router MAC addresses8-27
configuration guidelines8-27
described8-27
unicast traffic, blocking22-6
UniDirectional Link Detection protocol
See UDLD
UNIX syslog servers
daemon configuration27-11
facilities supported27-12
message logging configuration27-11
unrecognized Type-Length-Value (TLV) support18-4
upgrade
behavior details13-26
configuring for13-24
conrtoller configuration13-25
example13-26
global configuration13-25
LRE switch firmware upgrade13-23
performing13-24
upgrading software, VLAN considerations18-8
upgrading software images
See downloading
UplinkFast
described16-4
enabling16-18
support for1-5
uploading
configuration files
preparingB-11, B-13, B-16
reasons forB-8
using FTPB-15
using RCPB-18
using TFTPB-12
image files
preparingB-21, B-25, B-29
reasons forB-19
using FTPB-27
using RCPB-32
using TFTPB-24
upstream power back-off1-8, 13-21
user EXEC mode2-2
username-based authentication9-7
V
version-dependent transparent mode18-4
virtual IP address
cluster standby group7-14, 7-24
command switch7-14, 7-24
See also IP addresses
vlan.dat file17-4
VLAN 1 minimization, support for1-6
VLAN configuration
at bootup17-7
saving17-7
VLAN configuration mode2-2, 17-6
VLAN database
and startup configuration file17-7
and VTP18-1
VLAN configuration saved in17-7
VLANs saved in17-4
vlan database command17-6
vlan global configuration command17-6
VLAN ID, discovering8-28
VLAN management domain18-2
VLAN Management Policy Server
See VMPS
VLAN membership
confirming17-30
modes17-3
VLAN Query Protocol
See VQP
VLANs
adding17-8
adding to VLAN database17-8
aging dynamic addresses14-8
allowed on trunk17-19
and spanning-tree instances17-2, 17-6, 17-13
configuration guidelines, normal-range VLANs17-5
configuration options17-6
configuring17-1
configuring IDs 1006 to 409417-12
VLANs (continued)
creating in config-vlan mode17-8
creating in VLAN configuration mode17-9
default configuration17-7
deleting17-10
described11-3, 17-1
displaying17-14
extended-range17-1, 17-12
illustrated17-2
modifying17-8
native, configuring17-21
normal-range17-1, 17-4
parameters17-4
port membership modes17-3
static-access ports17-11
STP and 802.1Q trunks14-10
supported17-2
Token Ring17-5
trunks, VLAN 1 minimization17-19
VTP modes18-3
VLAN Trunking Protocol
See VTP
VLAN trunks17-15
VMPS
administering17-31
configuration example17-32
configuration guidelines17-28
default configuration17-28
description17-25
dynamic port membership
described17-26
reconfirming17-30
troubleshooting17-32
entering server address17-29
mapping MAC addresses to VLANs17-25
monitoring17-31
reconfirmation interval, changing17-30
reconfirming membership17-30
retry count, changing17-31
voice VLAN
Cisco 7960 phone, port connections19-1
configuration guidelines19-3
configuring IP phones for data traffic
override CoS of incoming frame19-5
trust CoS priority of incoming frame19-6
configuring ports for voice traffic in
802.1P priority tagged frames19-4
802.1Q frames19-4
connecting to an IP phone19-3
default configuration19-2
described19-1
displaying19-6
VQP17-25
VTP
adding a client to a domain18-14
advertisements17-17, 18-3
and extended-range VLANs18-1
and normal-range VLANs18-1
client mode, configuring18-11
configuration
global configuration mode18-7
guidelines18-8
privileged EXEC mode18-7
requirements18-9
saving18-7
VLAN configuration mode18-7
configuration mode options18-7
configuration requirements18-9
configuration revision number
guideline18-14
resetting18-15
configuring
client mode18-11
server mode18-9
transparent mode18-12
consistency checks18-4
default configuration18-6
described18-1
VTP (continued)
disabling18-12
domain names18-8
domains18-2
modes
client18-3, 18-11
server18-3, 18-9
transitions18-3
transparent18-3, 18-12
monitoring18-15
passwords18-8
pruning
disabling18-14
enabling18-14
examples18-5
overview18-4
pruning-eligible list, changing17-20
server mode, configuring18-9
statistics18-15
Token Ring support18-4
transparent mode, configuring18-12
using18-1
version, guidelines18-9
version 118-4
version 2
configuration guidelines18-9
disabling18-13
enabling18-13
overview18-4
W
warningsxxviii
Weighted Round Robin
See WRR
wizards4-6
WRR
configuring30-36
defining30-9
description30-9
X
XMODEM protocol32-2