Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -
Index
Numerics
144-bit Layer 3 TCAM 7-28, 31-68
802.1D
See STP
802.1Q
and trunk ports 10-3
configuration limitations 12-18
encapsulation 12-16
native VLAN for untagged traffic 12-23
tunneling
compatibility with other features 15-5
defaults 15-4
described 15-1
tunnel ports and ACLs 28-3
tunnel ports with other features 15-6
802.1S
See MSTP
802.1W
See RSTP
802.1X
See port-based authentication
802.3X flow control 10-15
A
abbreviating commands 2-4
ABRs 31-29
AC (command switch) 6-13, 6-23
access-class command 28-20
access control entries
See ACEs
access-denied response, VMPS 12-27
access groups
IP 28-21
Layer 3 28-21
accessing
clusters, switch 6-16
command switches 6-13
member switches 6-16
switch clusters 6-16
access lists
See ACLs
access ports
and Layer 2 protocol tunneling 15-10
defined 10-3
in switch clusters 6-11
accounting
with RADIUS 8-28
with TACACS+ 8-11, 8-17
ACEs
and QoS 29-7
defined 28-2
Ethernet 28-2
IP 28-2
ACLs
ACEs 28-2
and logging 28-7
any keyword 28-13
applying
on bridged packets 28-38
on multicast packets 28-40
on routed packets 28-39
on switched packets 28-37
time ranges to 28-17
to Layer 2 and Layer 3 interfaces 28-20
to QoS 29-7
classifying traffic for QoS 29-36
comments in 28-19
compatibility on the same switch 28-2
compiling 28-21
configuration conflict examples 28-44
configuring with VLAN maps 28-36
defined 28-1
examples, not fitting in hardware 28-45
examples of 28-21, 29-36
extended IP
configuring for QoS classification 29-37
creating 28-11
matching criteria 28-8
feature manager 28-43
hardware and software handling 28-6
hardware support for 28-6
host keyword 28-13
IP
applying to interface 28-19
creating 28-8
defined 28-8
fragments and QoS guidelines 29-27
implicit deny 28-10, 28-14, 28-16
implicit masks 28-10
matching criteria 28-8
matching criteria for port ACLs 28-4
matching criteria for router ACLs 28-3
named 28-15
options and QoS guidelines 29-27
undefined 28-21
violations, logging 28-16
virtual terminal lines, setting on 28-19
limiting actions 28-37
logging messages 28-10
log keyword 28-16
MAC extended 28-26, 29-38
matching 28-8, 28-21, 28-28
merge failure examples 28-46
monitoring 28-41
named 28-15
not fitting in hardware 28-45
number per QoS class map 29-27
numbers 28-8
policy maps and QoS classification 29-27
port
and voice VLAN 28-4
defined 28-2
limitations 28-4
QoS 29-7, 29-36
router 28-2
standard IP
configuring for QoS classification 29-36
creating 28-9
matching criteria 28-8
support for 1-4
time ranges 28-17
undefined 28-28
unsupported features 28-7
using router ACLs with VLAN maps 28-36
VLAN maps
configuration guidelines 28-30
configuring 28-29
defined 28-4
active router 32-1
addresses
displaying the MAC address table 7-27
dynamic
accelerated aging 16-8
changing the aging time 7-22
default aging 16-8
defined 7-20
learning 7-21
preventing frame forwarding 36-5
removing 7-23
filtering frames by MAC address 36-6
multicast
group address range 34-1
STP address management 16-8
static
adding and removing 7-25
defined 7-20
address resolution 31-8
Address Resolution Protocol
See ARP
adjacency tables, with CEF 31-76
administrative distances
defined 31-87
OSPF 31-34
routing protocol defaults 31-77
advertisements
CDP 22-1
IGRP 31-24
RIP 31-19
VTP 12-19, 13-3
aggregate addresses, BGP 31-60
aggregated ports
See EtherChannel
aggregate policers 29-49
aggregate policing 1-6
aging, accelerating 16-8
aging time
accelerated
for MSTP 17-20
for STP 16-8, 16-22
bridge table for fallback bridging 36-6
MAC address table 7-22
maximum
for MSTP 17-21
for STP 16-22
alarms, RMON 25-3
allowed-VLAN list 12-21
alternate routes, IGRP 31-25
area border routers
See ABRs
ARP
configuring 31-9
defined 31-8
encapsulation 31-10
static cache configuration 31-9
support for 1-3
ASBRs 31-29
AS-path filters, BGP 31-54
asymmetrical links, and 802.1Q tunneling 15-4
attributes, RADIUS
vendor-proprietary 8-31
vendor-specific 8-29
audience xxxv
authentication
EIGRP 31-42
HSRP 32-9
local mode with AAA 8-36
NTP associations 7-4
RADIUS
key 8-21
login 8-23
TACACS+
defined 8-11
key 8-13
login 8-14
See also port-based authentication
authentication keys, and routing protocols 31-88
authoritative time source, described 7-2
authorization
with RADIUS 8-27
with TACACS+ 8-11, 8-16
authorized ports with 802.1X 9-4
autoconfiguration 4-3
automatic discovery
adding member switches 6-20
considerations
beyond a non-candidate device 6-8, 6-9
brand new switches 6-11
connectivity 6-5
different VLANs 6-7
management VLANs 6-8, 6-9
non-CDP-capable devices 6-6
non-cluster-capable devices 6-6
routed ports 6-10
creating a cluster standby group 6-22
in switch clusters 6-5
See also CDP
automatic QoS
See QoS
automatic recovery, clusters 6-12
See also HSRP
autonegotiation
duplex mode 1-2
interface configuration guidelines 10-13
mismatches 37-10
autonomous system boundary routers
See ASBRs
autonomous systems, in BGP 31-48
Auto-RP, described 34-8
autosensing, port speed 1-2
auxiliary VLAN
See voice VLAN
B
BackboneFast
described 18-10
enabling 18-20
support for 1-3
bandwidth for QoS
allocating 29-63
described 29-13
banners
configuring
login 7-20
message-of-the-day login 7-19
default configuration 7-18
when displayed 7-18
BGP
aggregate addresses 31-60
aggregate routes, configuring 31-60
CIDR 31-60
clear commands 31-63
community filtering 31-56
configuring neighbors 31-58
default configuration 31-46
described 31-45
enabling 31-48
monitoring 31-63
multipath support 31-51
neighbors, types of 31-48
path selection 31-51
peers, configuring 31-58
prefix filtering 31-55
resetting sessions 31-50
route dampening 31-62
route maps 31-53
route reflectors 31-61
routing domain confederation 31-60
routing session with multi-VRF CE 31-70
show commands 31-63
supernets 31-60
support for 1-6
Version 4 31-45
binding cluster group and HSRP group 32-10
blocking packets 21-6
booting
boot loader, function of 4-2
boot process 4-1
manually 4-13
specific image 4-14
boot loader
accessing 4-15
described 4-2
environment variables 4-15
prompt 4-15
trap-door mechanism 4-2
bootstrap router (BSR), described 34-8
Border Gateway Protocol
See BGP
BPDU
error-disabled state 18-3
filtering 18-3
RSTP format 17-9
BPDU filtering
described 18-3
enabling 18-16
support for 1-4
BPDU guard
described 18-3
enabling 18-15
support for 1-4
bridged packets, ACLs on 28-38
bridge groups
See fallback bridging
bridge protocol data unit
See BPDU
broadcast flooding 31-16
broadcast packets
directed 31-13
flooded 31-13
broadcast storm-control command 21-3
broadcast storms 21-1, 31-13
browser configuration 6-1
C
cables, monitoring for unidirectional links 23-1
cache engines, redirecting traffic to 33-1
CAMs, ACLs not loading in 28-45
candidate switch
adding 6-20
automatic discovery 6-5
defined 6-4
HC 6-23
passwords 6-20
requirements 6-4
standby group 6-22
See also command switch, cluster standby group, and member switch
caution, described xxxvi
CC (command switch) 6-23
CDP
and trusted boundary 29-32
automatic discovery in switch clusters 6-5
configuring 22-2
default configuration 22-2
described 22-1
disabling for routing device 22-3, 22-4
enabling and disabling
on an interface 22-4
on a switch 22-3
Layer 2 protocol tunneling 15-7
monitoring 22-5
overview 22-1
support for 1-3
transmission timer and holdtime, setting 22-2
updates 22-2
CEF 31-75
CGMP
as IGMP snooping learning method 20-8
clearing cached group entries 34-58
enabling server support 34-38
FastLeave feature 34-13
hosts
joining a group 34-12
leaving a group 34-13
joining multicast group 20-3
overview 34-11
server support only 34-11
switch support of 1-2
CIDR 31-60
Cisco Discovery Protocol
See CDP
Cisco Express Forwarding
See CEF
Cisco Group Management Protocol
See CGMP
Cisco Intelligence Engine 2100 Series Configuration Registrar
See IE2100
Cisco IOS File System
See IFS
Cisco Networking Services
See IE2100
CiscoWorks 2000 1-8, 27-4
classless interdomain routing
See CIDR
classless routing 31-7
class maps for QoS
configuring per physical port 29-39
configuring per-port per-VLAN 29-41
described 29-7
displaying 29-69
class of service
See CoS
clearing interfaces 10-21
CLI
abbreviating commands 2-4
command modes 2-1
described 1-7
editing features
enabling and disabling 2-7
keystroke editing 2-7
wrapped lines 2-8
error messages 2-5
filtering command output 2-9
getting help 2-3
history
changing the buffer size 2-5
described 2-5
disabling 2-6
recalling commands 2-6
managing clusters 6-25
no and default forms of commands 2-4
client mode, VTP 13-3
clock
See system clock
clusters, switch
accessing 6-16
adding member switches 6-20
automatic discovery 6-5
automatic recovery 6-12
benefits 1-8
command switch configuration 6-19
compatibility 6-5
creating 6-19
creating a cluster standby group 6-22
described 6-1
LRE profile considerations 6-18
managing
through CLI 6-25
through SNMP 6-26
planning 6-5
planning considerations
automatic discovery 6-5
automatic recovery 6-12
CLI 6-25
host names 6-16
IP addresses 6-16
LRE profiles 6-18
passwords 6-16
RADIUS 6-17
SNMP 6-17, 6-26
switch-specific features 6-18
TACACS+ 6-17
redundancy 6-22
troubleshooting 6-25
verifying 6-24
See also candidate switch, command switch, cluster standby group, member switch, and standby command switch
cluster standby group
and HSRP group 32-10
automatic recovery 6-15
considerations 6-13
creating 6-22
defined 6-2
requirements 6-3
virtual IP address 6-13
See also HSRP
CMS
benefits 1-8
configuration modes 3-5
described 1-1, 1-7
Front Panel view
described 3-2
operating systems and supported browsers 3-8
requirements 3-7 to 3-9
Topology view 3-14
wizards 3-6
Coarse Wave Division Multiplexer GBIC modules
See CWDM GBIC modules
command-line interface
See CLI
command modes 2-1
commands
abbreviating 2-4
no and default 2-4
setting privilege levels 8-8
command switch
accessing 6-13
active (AC) 6-13, 6-23
command switch with HSRP disabled (CC) 6-23
configuration conflicts 37-10
defined 6-2
enabling 6-19
passive (PC) 6-13, 6-23
password privilege levels 6-26
priority 6-13
recovery
from command-switch failure 6-13
from failure 37-6
from lost member connectivity 37-10
redundant 6-12, 6-22
replacing
with another switch 37-8
with cluster member 37-7
requirements 6-3
standby (SC) 6-13, 6-23
See also candidate switch, cluster standby group, member switch, and standby command switch
community list, BGP 31-57
community strings
configuring 6-17, 27-7
for cluster switches 27-4
in clusters 6-17
overview 27-4
SNMP 6-17
config.text 4-12
configuration conflicts
ACL, displaying 28-44
recovering from lost member connectivity 37-10
configuration conflicts, recovering from lost member connectivity 37-10
configuration examples, network 1-9
configuration files
clearing the startup configuration B-18
creating using a text editor B-9
default name 4-12
deleting a stored configuration B-18
described B-8
downloading
automatically 4-12
preparing B-10, B-12, B-15
reasons for B-8
using FTP B-13
using RCP B-16
using TFTP B-10
guidelines for creating and using B-8
invalid combinations when copying B-5
limiting TFTP server access 27-15
obtaining with DHCP 4-7
password recovery disable considerations 8-5
specifying the filename 4-13
system contact and location information 27-15
types and location B-9
uploading
preparing B-10, B-12, B-15
reasons for B-8
using FTP B-14
using RCP B-17
using TFTP B-11
VMPS database 12-28
configuration guidelines, multi-VRF CE 31-68
configuration modes, CMS 3-5
configuration settings, saving 4-10
configure terminal command 10-7
configuring inline power 10-14
config-vlan mode 2-2, 12-6
conflicts, configuration 37-10
congestion-avoidance techniques 29-12
congestion-management techniques 29-12, 29-15
connections, secure remote 8-38
connectivity problems 37-11
consistency checks in VTP version 2 13-4
console port, connecting to 2-10
content-routing technology
See WCCP
conventions
command xxxvi
for examples xxxvi
publication xxxvi
text xxxvi
CoS
in Layer 2 frames 29-2
override priority 14-5
trust priority 14-6
CoS-to-DSCP map for QoS 29-52
CoS-to-egress-queue map 29-57
counters, clearing interface 10-21
CPU q, in show forward command output 37-20
crashinfo file 37-20
cross-stack UplinkFast, STP
connecting stack ports 18-8
described 18-5
enabling 18-19
fast-convergence events 18-7
Fast Uplink Transition Protocol 18-6
limitations 18-8
normal-convergence events 18-7
Stack Membership Discovery Protocol 18-6
support for 1-3
cryptographic software image
Kerberos 8-32
SSH 8-37
customer edge devices 31-65
CWDM GBIC modules
network example 1-19
CWDM OADM modules 1-19
D
daylight saving time 7-13
debugging
enabling all system diagnostics 37-17
enabling for a specific feature 37-16
redirecting error message output 37-17
using commands 37-16
default commands 2-4
default configuration
802.1Q tunneling 15-4
802.1X 9-9
auto-QoS 29-18
banners 7-18
BGP 31-46
booting 4-12
CDP 22-2
DHCP 19-3
DNS 7-17
EIGRP 31-39
EtherChannel 30-8
fallback bridging 36-3
HSRP 32-4
IGMP 34-31
IGMP filtering 20-22
IGMP snooping 20-6
IGMP throttling 20-22
IGRP 31-25
initial switch information 4-3
IP addressing, IP routing 31-4
IP multicast routing 34-13
Layer 2 interfaces 10-12
Layer 2 protocol tunneling 15-10
MAC address table 7-22
MSDP 35-4
MSTP 17-12
multi-VRF CE 31-67
MVR 20-16
NTP 7-4
optional spanning-tree features 18-14
OSPF 31-30
password and privilege level 8-2
RADIUS 8-20
RIP 31-19
RMON 25-3
RSPAN 24-8
SNMP 27-6
SPAN 24-8
standard QoS 29-25
STP 16-11
system message logging 26-3
system name and prompt 7-15
TACACS+ 8-13
UDLD 23-4
VLAN, Layer 2 Ethernet interfaces 12-19
VLANs 12-7
VMPS 12-30
voice VLAN 14-2
VTP 13-6
WCCP 33-5
default gateway 4-10, 31-11
default networks 31-78
default routes 31-78
default routing 31-2
deleting VLANs 12-10
description command 10-17
designing your network, examples 1-9
destination addresses, in ACLs 28-12
detecting indirect link failures, STP 18-10
device discovery protocol 22-1
Device Manager 3-14
See also Switch Manager
DHCP-based autoconfiguration
client request message exchange 4-4
configuring
client side 4-3
DNS 4-6
relay device 4-6
server-side 4-5
TFTP server 4-6
example 4-8
lease options
for IP address information 4-5
for receiving the configuration file 4-5
overview 4-3
relationship to BOOTP 4-3
relay support 1-6
support for 1-2
DHCP option 82
configuration guidelines 19-3
default configuration 19-3
displaying 19-9
enabling
relay agent 19-6
relay agent information option 19-6
forwarding address, specifying 19-7
helper address 19-7
overview 19-2
policy for reforwarding 19-7
reforwarding policy 19-7
support for 1-2
validating 19-6
DHCP snooping
configuration guidelines 19-3
default configuration 19-3
displaying binding tables 19-9
displaying configuration 19-10
message exchange process 19-2
option 82 data insertion 19-2
Differentiated Services architecture, QoS 29-2
Differentiated Services Code Point 29-2
Diffusing Update Algorithm (DUAL) 31-38
directed unicast requests 1-3
directories
changing B-3
creating and removing B-4
displaying the working B-3
discovery, clusters
See automatic discovery
Distance Vector Multicast Routing Protocol
See DVMRP
distance-vector protocols 31-2
distribute-list command 31-86
DNS
and DHCP-based autoconfiguration 4-6
default configuration 7-17
displaying the configuration 7-18
overview 7-16
setting up 7-17
support for 1-2
documentation, related xxxvi
document conventions xxxvi
domain names
DNS 7-16
VTP 13-8
Domain Name System
See DNS
dot1q-tunnel switchport mode 12-17
double-tagged packets
802.1Q tunneling 15-2
Layer 2 protocol tunneling 15-9
downloading
configuration files
preparing B-10, B-12, B-15
reasons for B-8
using FTP B-13
using RCP B-16
using TFTP B-10
image files
deleting old image B-22
preparing B-20, B-24, B-28
reasons for B-18
using FTP B-25
using RCP B-29
using TFTP B-21
drop threshold for Layer 2 protocol packets 15-10
DSCP 1-5, 29-2
DSCP-to-CoS map for QoS 29-54
DSCP-to-DSCP-mutation map for QoS 29-55
DSCP-to-threshold map for QoS 29-60
DTP 1-4, 12-16
DUAL finite state machine, EIGRP 31-38
duplex mode, configuring 10-13
DVMRP
all-DVMRP-routers multicast group address 34-11
autosummarization
configuring a summary address 34-54
disabling 34-56
connecting PIM domain to DVMRP router 34-46
enabling unicast routing 34-50
interoperability
with Cisco devices 34-44
with Cisco IOS software 34-11
mrinfo requests, responding to 34-49
neighbors
advertising the default route to 34-48
discovery with Probe messages 34-11, 34-44
displaying information 34-49
prevent peering with nonpruning 34-52
rejecting nonpruning 34-51
overview 34-11
routes
adding a metric offset 34-56
advertising all 34-56
advertising the default route to neighbors 34-48
caching DVMRP routes learned in report messages 34-50
changing the threshold for syslog messages 34-54
deleting 34-58
displaying 34-58
favoring one over another 34-56
limiting the number injected into MBONE 34-53
limiting unicast route advertisements 34-44
route table, building 34-11
source distribution tree, building 34-11
support for 1-6
tunnels
configuring 34-46
displaying neighbor information 34-49
dynamic access ports
characteristics 12-3
configuring 12-32
defined 10-3
dynamic addresses
See addresses
dynamic desirable trunking mode 12-17
Dynamic Host Configuration Protocol
See DHCP-based autoconfiguration
dynamic port VLAN membership
described 12-28
reconfirming 12-32, 12-33
troubleshooting 12-34
types of connections 12-32
VMPS database configuration file 12-28
dynamic routing 31-2
Dynamic Trunking Protocol
See DTP
E
EBGP 31-44
editing features
enabling and disabling 2-7
keystrokes used 2-7
wrapped lines 2-8
egress q, in show forward command output 37-19
EIGRP
and IGRP 31-40
authentication 31-42
components 31-38
configuring 31-40
default configuration 31-39
definition 31-38
interface parameters, configuring 31-41
monitoring 31-43
support for 1-6
enable password 8-4
enable secret password 8-4
encryption for passwords 8-4
Enhanced IGRP
See EIGRP
environment variables
function of 4-16
location in Flash 4-15
equal-cost routing 1-6, 31-76
error messages
during command entry 2-5
setting the display destination device 26-4
severity levels 26-8
system message format 26-2
EtherChannel
automatic creation of 30-3
channel groups
binding physical and logical interfaces 30-2
numbering of 30-3
configuration guidelines 30-8
configuring
Layer 2 interfaces 30-9
Layer 3 physical interfaces 30-12
Layer 3 port-channel logical interfaces 30-11
default configuration 30-8
destination MAC address forwarding 30-6
displaying status 30-18
forwarding methods 30-14
interaction
with STP 30-8
with VLANs 30-9
LACP, support for 1-2
Layer 3 interface 31-3
load balancing 30-6, 30-14
logical interfaces, described 30-2
number of interfaces per 30-2
overview 30-1
PAgP
aggregate-port learners 30-5
compatibility with Catalyst 1900 30-15
displaying status 30-18
interaction with other features 30-6
learn method and priority configuration 30-15
modes 30-4
overview 30-3
silent mode 30-4
support for 1-2
port-channel interfaces
described 30-2
numbering of 30-3
port groups 10-5
source MAC address forwarding 30-6
support for 1-2
EtherChannel guard
described 18-12
enabling 18-20
Ethernet VLANs
adding 12-8
defaults and ranges 12-8
modifying 12-8
events, RMON 25-3
examples
conventions for xxxvi
network configuration 1-9
expedite queue for QoS
10/100 Ethernet ports
allocating bandwidth 29-67
configuring 29-66
described 29-15
Gigabit-capable Ethernet ports
allocating bandwidth 29-63
configuring 29-62
described 29-12
expert mode 3-6
Express Setup 3-11
extended-range VLANs
configuration guidelines 12-12
configuring 12-12
creating 12-12, 12-13
defined 12-1
extended system ID
MSTP 17-14
STP 16-3, 16-14
Extensible Authentication Protocol over LAN 9-1
exterior routes, IGRP 31-24
external BGP
See EBGP
external neighbors, BGP 31-48
F
fallback bridging
and protected ports 36-4
bridge groups
creating 36-4
described 36-1
displaying 36-12
function of 36-2
number supported 36-4
removing 36-4
bridge table
changing the aging time 36-6
clearing 36-12
displaying 36-12
configuration guidelines 36-3
connecting interfaces with 10-7
default configuration 36-3
described 36-1
frame forwarding
filtering by MAC address 36-6
flooding packets 36-2
for static addresses 36-5
forwarding packets 36-2
preventing for dynamically learned stations 36-5
to static addresses 36-5
overview 36-1
STP
disabling on an interface 36-12
forward-delay interval 36-10
hello BPDU interval 36-10
interface priority 36-8
maximum-idle interval 36-11
path cost 36-9
switch priority 36-8
VLAN-bridge STP 36-1, 36-2
support for 1-6
SVIs and routed ports 36-1
VLAN-bridge STP 16-10
fallback VLAN name 12-28
Fast Uplink Transition Protocol 18-6
feature manager, ACL 28-43
FIB 31-76
fiber-optic, detecting unidirectional links 23-1
files
copying B-4
crashinfo
description 37-20
displaying the contents of 37-20
location 37-20
deleting B-5
displaying the contents of B-7
tar
creating B-5
displaying the contents of B-6
extracting B-7
image file format B-19
file system
displaying available file systems B-2
displaying file information B-3
local file system names B-1
network file system names B-4
setting the default B-3
filtering
in a VLAN 28-29
non-IP traffic 28-26
show and more command output 2-9
with fallback bridging 36-6
filters, IP
See ACLs, IP
Flash device, number of B-1
Flash updates, IGRP 31-25
flooded traffic, blocking 21-6
flow-based packet classification 1-5
flowcharts
QoS classification 29-6
QoS policing and marking 29-10
QoS queueing and scheduling
10/100 ports 29-15
Gigabit-capable ports 29-12
flow control 1-2, 10-15
forward-delay time
MSTP 17-20
STP 16-5, 16-22
Forwarding Information Base
See FIB
forwarding non-routable protocols 36-1
FTP
accessing MIB files A-3
configuration files
downloading B-13
overview B-11
preparing the server B-12
uploading B-14
image files
deleting old image B-26
downloading B-25
preparing the server B-24
uploading B-26
G
GBICs
1000BASE-LX/LH module 1-11
1000BASE-SX module 1-11
1000BASE-T module 1-11
1000BASE-ZX module 1-11
CWDM module 1-19
GigaStack module 1-10
security and identification 37-10
get-bulk-request operation 27-3
get-next-request operation 27-3, 27-4
get-request operation 27-3, 27-4
get-response operation 27-3
Gigabit GBIC modules
See GBICs
Gigabit Interface Converters
See GBICs
GigaStack GBIC
fast transition of redundant link 18-5
See also GBICs
global configuration mode 2-2
guide
audience xxxv
purpose of xxxv
guide mode 1-8, 3-5
H
hardware, determining ACL configuration fit 28-45
HC (candidate switch) 6-23
hello time
MSTP 17-19
STP 16-21
help, for the command line 2-3
history
changing the buffer size 2-5
described 2-5
disabling 2-6
recalling commands 2-6
history table, level and number of syslog messages 26-10
host names
abbreviations appended to 6-23
in clusters 6-16
hosts, limit on dynamic ports 12-34
Hot Standby Router Protocol
See HSRP
HP OpenView 1-8
HSRP
authentication string 32-9
automatic cluster recovery 6-15
binding to cluster group 32-10
cluster standby group considerations 6-13
command-switch redundancy 1-3
default configuration 32-4
definition 32-1
monitoring 32-11
overview 32-1
priority 32-6
routing redundancy 1-6
timers 32-9
tracking 32-7
See also clusters, cluster standby group, and standby command switch
I
IBPG 31-44
ICMP
redirect messages 31-11
support for 1-6
time exceeded messages 37-13
traceroute and 37-13
unreachable messages 28-6
unreachables and ACLs 28-6
ICMP ping
executing 37-11
overview 37-11
ICMP Router Discovery Protocol
See IRDP
IDS, using with SPAN and RSPAN 24-2
IE2100
CNS embedded agents
described 5-5
enabling automated configuration 5-6
enabling configuration agent 5-9
enabling event agent 5-8
Configuration Registrar
configID, deviceID, hostname 5-3
configuration service 5-2
described 5-1
event service 5-3
described 1-8
support for 1-2
IEEE 802.1P 14-1
IFS 1-3
IGMP
configuring the switch
as a member of a group 34-34
statically connected member 34-36
controlling access to groups 34-35
default configuration 34-31
deleting cache entries 34-58
displaying groups 34-58
fast switching 34-37
host-query interval, modifying 34-36
joining multicast group 20-3
join messages 20-3
leave processing, enabling 20-10
leaving multicast group 20-4
multicast reachability 34-34
overview 34-3
queries 20-3
report suppression
described 20-5
disabling 20-11
support for 1-2
throttling action 20-22
Version 1
changing to Version 2 34-32
hosts joining a group 34-3
hosts leaving a group 34-3
membership queries 34-3
overview 34-3
query-response model 34-3
Version 2
changing to Version 1 34-32
enhancements over Version 1 34-4
hosts leaving a group 34-4
maximum query response time value 34-33
new features 34-4
overview 34-4
pruning groups 34-33
query timeout value 34-32
IGMP filtering
configuring 20-22
default configuration 20-22
described 20-21
monitoring 20-27
IGMP groups
configuring the throttling action 20-25
setting the maximum number 20-24
IGMP profile
applying 20-23
configuration mode 20-22
configuring 20-23
IGMP snooping
configuring 20-6
default configuration 20-6
definition 20-1
enabling and disabling 20-7
global configuration 20-7
Immediate Leave 20-5
method 20-8
monitoring 20-12
support for 1-2
VLAN configuration 20-7
IGMP throttling
configuring 20-25
default configuration 20-22
described 20-22
displaying action 20-27
IGP 31-29
IGRP
advertisements 31-24
alternate routes 31-25
configuring 31-26
default configuration 31-25
described 31-24
exterior routes 31-24
flash updates 31-25
interior routes 31-24
load balancing 31-25
poison-reverse updates 31-25
split horizon 31-28
support for 1-6
system routes 31-24
traffic sharing 31-26
unequal-cost load balancing 31-25
Immediate-Leave, IGMP 20-5
Intelligence Engine 2100 Series CNS Agents
See IE2100
interface
number 10-7
range macros 10-10
interface command 10-7
interface configuration mode 2-3
interfaces
configuration guidelines 10-13
configuring 10-7
configuring duplex mode 10-13
configuring speed 10-13
counters, clearing 10-21
described 10-17
descriptive name, adding 10-17
displaying information about 10-19
flow control 10-15
management 1-7
monitoring 10-19
naming 10-17
physical, identifying 10-7
range of 10-8
restarting 10-22
shutting down 10-22
supported 10-7
types of 10-1
interfaces range macro command 10-10
Interior Gateway Protocol
See IGP
Interior Gateway Routing Protocol
See IGRP
interior routes, IGRP 31-24
internal BGP
See IBGP
internal neighbors, BGP 31-48
Internet Control Message Protocol
See ICMP
Internet Group Management Protocol
See IGMP
Inter-Switch Link
See ISL
inter-VLAN routing 1-6, 31-2
Intrusion Detection System
See IDS
inventory, cluster 6-24
IOS File System
See IFS
ip access-group command 28-21
IP ACLs
applying to an interface 28-19
extended, creating 28-11
for QoS classification 29-7
implicit deny 28-10, 28-14, 28-16
implicit masks 28-10
logging 28-16
named 28-15
standard, creating 28-9
undefined 28-21
virtual terminal lines, setting on 28-19
IP addresses
candidate or member 6-4, 6-16
classes of 31-5
cluster access 6-2
command switch 6-3, 6-13, 6-16
default configuration 31-4
for IP routing 31-4
MAC address association 31-8
monitoring 31-17
redundant clusters 6-13
standby command switch 6-13, 6-16
See also IP information
IP broadcast address 31-15
ip cef command 31-76
IP directed broadcasts 31-13
ip igmp profile command 20-22
IP information
assigned
manually 4-10
through DHCP-based autoconfiguration 4-3
default configuration 4-3
IP multicast routing
addresses
all-hosts 34-1
all-multicast-routers 34-1
all-PIM-routers 34-10
Cisco-RP-Announce 34-8
Cisco-RP-Discovery 34-8
host group address range 34-1
administratively-scoped boundaries, described 34-42
and IGMP snooping 20-1, 20-6
Auto-RP
adding to an existing sparse-mode cloud 34-19
benefits of 34-18
clearing the cache 34-58
configuration guidelines 34-15
IOS release 34-5
overview 34-8
preventing candidate RP spoofing 34-21
preventing join messages to false RPs 34-20
setting up in a new internetwork 34-19
using with BSR 34-27
bootstrap router
configuration guidelines 34-15
configuring candidate BSRs 34-25
configuring candidate RPs 34-26
defining the IP multicast boundary 34-24
defining the PIM domain border 34-22
IOS release 34-5
overview 34-8
using with Auto-RP 34-27
Cisco implementation 34-2
configuring
basic multicast routing 34-15
IP multicast boundary 34-42
TTL threshold 34-40
default configuration 34-13
enabling
multicast forwarding 34-15
PIM mode 34-16
group-to-RP mappings
Auto-RP 34-8
BSR 34-8
MBONE
deleting sdr cache entries 34-58
described 34-39
displaying sdr cache 34-59
enabling sdr listener support 34-39
limiting DVMRP routes advertised 34-53
limiting sdr cache entry lifetime 34-39
SAP packets for conference session announcement 34-39
Session Directory (sdr) tool, described 34-39
monitoring
packet rate loss 34-59
peering devices 34-59
tracing a path 34-59
multicast forwarding, described 34-9
PIMv1 and PIMv2 interoperability 34-14
protocol interaction 34-2
reverse path check (RPF) 34-9
routing table
deleting 34-58
displaying 34-58
RP
assigning manually 34-17
configuring Auto-RP 34-18
configuring PIMv2 BSR 34-22
monitoring mapping information 34-27
using Auto-RP and BSR 34-27
statistics, displaying system and network 34-58
TTL thresholds, described 34-40
See also CGMP
See also DVMRP
See also IGMP
See also PIM
IP phones
and QoS 14-1
automatic classification and queueing 29-17
configuring 14-3
trusted boundary for QoS 29-32
IP precedence 29-2
IP-precedence-to-DSCP map for QoS 29-52
IP protocols
in ACLs 28-12
routing 1-6
IP routes, monitoring 31-89
IP routing
connecting interfaces with 10-6
enabling 31-18
IP traceroute
executing 37-13
overview 37-13
IP unicast routing
address resolution 31-8
administrative distances 31-77, 31-87
ARP 31-8
assigning IP addresses to Layer 3 interfaces 31-6
authentication keys 31-88
broadcast
address 31-15
flooding 31-16
packets 31-13
storms 31-13
classless routing 31-7
configuring static routes 31-77
default
addressing configuration 31-4
gateways 31-11
networks 31-78
routes 31-78
routing 31-2
directed broadcasts 31-13
dynamic routing 31-2
enabling 31-18
EtherChannel Layer 3 interface 31-3
IGP 31-29
inter-VLAN 31-2
IP addressing
classes 31-5
configuring 31-4
IRDP 31-12
Layer 3 interfaces 31-3
MAC address and IP address 31-8
passive interfaces 31-85
protocols
distance-vector 31-2
dynamic 31-2
link-state 31-2
proxy ARP 31-8
redistribution 31-79
reverse address resolution 31-8
routed ports 31-3
static routing 31-2
steps to configure 31-3
subnet mask 31-5
subnet zero 31-6
supernet 31-7
UDP 31-15
with SVIs 31-3
See also BGP
See also EIGRP
See also IGRP
See also OSPF
See also RIP
ip unreachables command 28-6
IRDP
configuring 31-12
definition 31-12
support for 1-6
ISL
and trunk ports 10-3
encapsulation 1-4, 12-16
trunking with 802.1Q tunneling 15-4
J
Java plug-in configuration 6-1
join messages, IGMP 20-3
K
KDC
described 8-32
See also Kerberos
Kerberos
authenticating to
boundary switch 8-35
KDC 8-35
network services 8-35
configuration examples 8-32
configuring 8-35
credentials 8-32
cryptographic software image 8-32
described 8-32
KDC 8-32
operation 8-34
realm 8-33
server 8-34
switch as trusted third party 8-32
terms 8-33
TGT 8-34
tickets 8-32
key distribution center
See KDC
L
l2protocol-tunnel command 15-11
LACP
Layer 2 protocol tunneling 15-9
See EtherChannel
Layer 2 frames, classification with CoS 29-2
Layer 2 interfaces, default configuration 10-12
Layer 2 protocol tunneling
configuring 15-9
configuring for EtherChannels 15-13
default configuration 15-10
defined 15-7
guidelines 15-10
Layer 2 traceroute
and ARP 37-15
and CDP 37-15
described 37-14
IP addresses and subnets 37-15
MAC addresses and VLANs 37-15
multicast traffic 37-15
multiple devices on a port 37-15
unicast traffic 37-14
usage guidelines 37-15
Layer 2 trunks 12-16
Layer 3 features 1-6
Layer 3 interfaces
assigning IP addresses to 31-6
changing from Layer 2 mode 31-6
types of 31-3
Layer 3 packets, classification methods 29-2
LDAP 5-2
leave processing, IGMP 20-10
lightweight directory access protocol
See LDAP
line configuration mode 2-3
Link Aggregation Control Protocol
See LACP
links, unidirectional 23-1
link state advertisements (LSAs) 31-33
link-state protocols 31-2
load balancing, IGRP 31-25
logging messages, ACL 28-10
login authentication
with RADIUS 8-23
with TACACS+ 8-14
login banners 7-18
log messages
See system message logging
long-distance, high-bandwidth transport configuration example 1-19
Long-Reach Ethernet (LRE) technology 1-10
loop guard
described 18-13
enabling 18-21
support for 1-4
LRE profiles, considerations in switch clusters 6-18
M
mac access-group command 28-28
MAC ACLs and Layer 2 interfaces 28-28
MAC addresses
aging time 7-22
and VLAN association 7-21
building the address table 7-21
default configuration 7-22
displaying 7-27
displaying in DHCP snooping binding table 19-10
dynamic
learning 7-21
removing 7-23
in ACLs 28-26
IP address association 31-8
static
adding 7-25
allowing 7-26
characteristics of 7-25
dropping 7-26
removing 7-25
sticky secure, adding 21-8
MAC address multicast entries, monitoring 20-13
MAC address-to-VLAN mapping 12-27
MAC extended access lists 28-26, 29-5, 29-38
macros
See SmartPort macros
MAN
CWDM configuration example 1-19
long-distance, high-bandwidth transport configuration example 1-19
manageability features 1-2
management options
benefits
clustering 1-8
CMS 1-8
CLI 2-1
CNS 5-1
overview 1-7
management VLAN
considerations in switch clusters 6-8, 6-9
discovery through different management VLANs 6-9
discovery through same management VLAN 6-8
mapping tables for QoS
configuring
CoS-to-DSCP 29-52
CoS-to-egress-queue 29-57
DSCP 29-51
DSCP-to-CoS 29-54
DSCP-to-DSCP-mutation 29-55
DSCP-to-threshold 29-60
IP-precedence-to-DSCP 29-52
policed-DSCP 29-53
described 29-10
marking
action in policy map 29-43
action with aggregate policers 29-49
described 29-4, 29-8
matching, ACLs 28-8
maximum aging time
MSTP 17-21
STP 16-22
maximum hop count, MSTP 17-21
maximum-paths command 31-51, 31-76
membership mode, VLAN port 12-3
member switch
adding 6-20
automatic discovery 6-5
defined 6-2
managing 6-25
passwords 6-16
recovering from lost connectivity 37-10
requirements 6-4
See also candidate switch, cluster standby group, and standby command switch
memory, optimizing 7-27
menu bar
variations 3-4
messages
logging ACL violations 28-16
messages to users through banners 7-18
metrics, in BGP 31-52
metric translations, between routing protocols 31-82
metropolitan-area networks
See MANs
metro tags 15-2
MIBs
accessing files with FTP A-3
location of files A-3
overview 27-1
SNMP interaction with 27-4
supported A-1
minimum-reserve levels
assigning to a queue 29-15, 29-66
configuring the buffer size 29-16, 29-65
default size 29-15
mini-point-of-presence
See POP
mirroring traffic for analysis 24-1
mismatches, autonegotiation 37-10
modules, GBIC
1000BASE-LX/LH 1-11
1000BASE-SX 1-11
1000BASE-T 1-11
1000BASE-ZX 1-11
CWDM 1-19
GigaStack 1-10
monitoring
802.1Q tunneling 15-17
access groups 28-41
ACL
configuration 28-41
configuration conflicts 28-44
fit in hardware 28-45
information 28-41
BGP 31-63
cables for unidirectional links 23-1
CDP 22-5
CEF 31-76
EIGRP 31-43
fallback bridging 36-12
features 1-7
HSRP 32-11
IGMP
filters 20-27
snooping 20-12
interfaces 10-19
IP
address tables 31-17
multicast routing 34-57
routes 31-89
Layer 2 protocol tunneling 15-17
MSDP peers 35-19
multicast router interfaces 20-12
multi-VRF CE 31-75
MVR 20-20
network traffic for analysis with probe 24-1
OSPF 31-37
port
blocking 21-16
protection 21-16
RP mapping information 34-27
source-active messages 35-19
speed and duplex mode 10-14
traffic flowing among switches 25-1
traffic suppression 21-16
tunneling 15-17
VLAN
filters 28-42
maps 28-42
VLANs 12-15
VMPS 12-34
VTP 13-15
MSDP
and dense-mode regions
sending SA messages to 35-17
specifying the originating address 35-18
benefits of 35-3
clearing MSDP connections and statistics 35-19
controlling source information
forwarded by switch 35-12
originated by switch 35-8
received by switch 35-14
default configuration 35-4
filtering
incoming SA messages 35-14
SA messages to a peer 35-12
SA requests from a peer 35-11
join latency, defined 35-6
meshed groups
configuring 35-16
defined 35-16
originating address, changing 35-18
overview 35-1
peer-RPF flooding 35-2
peers
configuring a default 35-4
monitoring 35-19
peering relationship, overview 35-1
requesting source information from 35-8
shutting down 35-16
source-active messages
caching 35-6
clearing cache entries 35-19
defined 35-2
filtering from a peer 35-11
filtering incoming 35-14
filtering to a peer 35-12
limiting data with TTL 35-14
monitoring 35-19
restricting advertised sources 35-9
MSTP
boundary ports
configuration guidelines 17-13
described 17-5
BPDU filtering
described 18-3
enabling 18-16
BPDU guard
described 18-3
enabling 18-15
CIST, described 17-3
configuration guidelines 17-12, 18-14
configuring
forward-delay time 17-20
hello time 17-19
link type for rapid convergence 17-22
maximum aging time 17-21
maximum hop count 17-21
MST region 17-13
path cost 17-18
port priority 17-17
root switch 17-14
secondary root switch 17-16
switch priority 17-19
CST
defined 17-3
operations between regions 17-3
default configuration 17-12
default optional feature configuration 18-14
displaying status 17-23
enabling the mode 17-13
EtherChannel guard
described 18-12
enabling 18-20
extended system ID
effects on root switch 17-14
effects on secondary root switch 17-16
unexpected behavior 17-15
instances supported 16-9
interface state, blocking to forwarding 18-2
interoperability and compatibility among modes 16-10
interoperability with 802.1D
described 17-5
restarting migration process 17-22
IST
defined 17-2
master 17-3
operations within a region 17-3
loop guard
described 18-13
enabling 18-21
mapping VLANs to MST instance 17-13
MST region
CIST 17-3
configuring 17-13
described 17-2
hop-count mechanism 17-4
IST 17-2
supported spanning-tree instances 17-2
optional features supported 1-3
overview 17-2
Port Fast
described 18-2
enabling 18-14
preventing root switch selection 18-12
root guard
described 18-12
enabling 18-21
root switch
configuring 17-15
effects of extended system ID 17-14
unexpected behavior 17-15
shutdown Port Fast-enabled port 18-3
multicast groups
and IGMP snooping 20-6
Immediate Leave 20-5
joining 20-3
leaving 20-4
static joins 20-9
multicast packets
ACLs on 28-40
blocking 21-6
multicast router interfaces, monitoring 20-12
multicast router ports, adding 20-9
Multicast Source Discovery Protocol
See MSDP
multicast storm-control command 21-3
multicast storms 21-1
Multicast VLAN Registration
See MVR
Multiple Spanning Tree Protocol
See MSTP
multiple VPN routing/forwarding in customer edge devices
See multi-VRF CE
multi-VRF CE
configuration example 31-71
configuration guidelines 31-68
configuring 31-67
default configuration 31-67
defined 31-65
displaying 31-75
monitoring 31-75
network components 31-67
packet-forwarding process 31-67
support for 1-6
MVR
configuring interfaces 20-18
default configuration 20-16
described 20-13
modes 20-17
monitoring 20-20
setting global parameters 20-17
support for 1-2
N
named IP ACLs 28-15
NameSpace Mapper
See NSM
native VLAN
and 802.1Q tunneling 15-4
configuring 12-23
default 12-23
neighbor discovery/recovery, EIGRP 31-38
neighbors, BGP 31-58
network configuration examples
increasing network performance 1-9
large network 1-15
long-distance, high-bandwidth transport 1-19
providing network services 1-10
small to medium-sized network 1-13
network design
performance 1-9
services 1-10
network management
CDP 22-1
RMON 25-1
SNMP 27-1
Network Time Protocol
See NTP
no commands 2-4
non-IP traffic filtering 28-26
nontrunking mode 12-17
normal-range VLANs
configuration modes 12-6
defined 12-1
no switchport command 10-5
note, described xxxvi
not-so-stubby areas
See NSSA
NSM 5-3
NSSA, OSPF 31-33
NTP
associations
authenticating 7-4
defined 7-2
enabling broadcast messages 7-6
peer 7-5
server 7-5
default configuration 7-4
displaying the configuration 7-10
overview 7-2
restricting access
creating an access group 7-8
disabling NTP services per interface 7-9
source IP address, configuring 7-9
stratum 7-2
support for 1-3
synchronizing devices 7-5
time
services 7-2
synchronizing 7-2
O
OADM modules
See CWDM OADM modules
Open Shortest Path First
See OSPF
optical add/drop multiplexer modules
See CWDM OADM modules
optimizing system resources 7-27
options, management 1-7
OSPF
area parameters, configuring 31-33
configuring 31-31
default configuration
metrics 31-34
route 31-34
settings 31-30
described 31-29
interface parameters, configuring 31-32
LSA group pacing 31-36
monitoring 31-37
router IDs 31-36
route summarization 31-34
support for 1-6
virtual links 31-34
out-of-profile markdown 1-6
output interface, getting information about 37-19
P
packet modification, with QoS 29-17
PAgP
Layer 2 protocol tunneling 15-9
See EtherChannel
parallel paths, in routing tables 31-76
passive interfaces
configuring 31-85
OSPF 31-34
pass-through mode 29-33
passwords
default configuration 8-2
disabling recovery of 8-5
encrypting 8-4
for security 1-4
in clusters 6-16, 6-20
overview 8-1
setting
enable 8-3
enable secret 8-4
Telnet 8-6
with usernames 8-7
VTP domain 13-8
path cost
MSTP 17-18
STP 16-18
PBR
defined 31-82
enabling 31-84
fast-switched policy-based routing 31-84
local policy-based routing 31-84
support for 1-6
PC (passive command switch) 6-13, 6-23
peers, BGP 31-58
performance, network design 1-9
performance features 1-2
per-VLAN spanning-tree plus
See PVST+
PE to CE routing, configuring 31-70
physical ports 10-2
PIM
default configuration 34-13
dense mode
(S,G) notation 34-6
graft messages 34-6
overview 34-5
pruning and SPT 34-5
rendezvous point (RP), described 34-7
RPF lookups 34-10
displaying neighbors 34-59
enabling a mode 34-16
neighbor discovery and adjacencies 34-10
overview 34-5
router-query message interval, modifying 34-30
shared tree and source tree, overview 34-28
shortest path tree, delaying the use of 34-29
sparse mode
(*,G) notation 34-7
join messages and shared tree 34-7
overview 34-7
prune messages 34-8
RPF lookups 34-10
support for 1-6
versions
interoperability 34-14
supported 34-5
troubleshooting interoperability problems 34-28
v2 improvements 34-5
PIM-DVMRP, as snooping method 20-8
ping
character output description 37-12
executing 37-11
overview 37-11
poison-reverse updates, IGRP 31-25
policed-DSCP map for QoS 29-53
policers
configuring
for each matched traffic class 29-43
for more than one traffic class 29-49
described 29-4
displaying 29-69
number of 1-6, 29-9
types of 29-8
policing
described 29-4
token bucket algorithm 29-8
policy-based routing
See PBR
policy maps for QoS
characteristics of 29-43
configuring 29-43
described 29-7
displaying 29-69
POP 1-17
port ACLs
and voice VLAN 28-4
defined 28-2
limitations 28-4
Port Aggregation Protocol
See EtherChannel
See PAgP
port-based authentication
authentication server
defined 9-2
RADIUS server 9-2
client, defined 9-2
configuration guidelines 9-10
configuring
802.1X authentication 9-11
guest VLAN 9-17
host mode 9-17
manual re-authentication of a client 9-14
periodic re-authentication 9-14
quiet period 9-15
RADIUS server 9-14
RADIUS server parameters on the switch 9-13
switch-to-client frame-retransmission number 9-16
switch-to-client retransmission time 9-15
default configuration 9-9
described 9-1
device roles 9-2
displaying statistics 9-19
EAPOL-start frame 9-3
EAP-request/identity frame 9-3
EAP-response/identity frame 9-3
enabling
802.1X with guest VLAN 9-7
802.1X with per-user ACLs 9-8, 9-11
802.1X with port security 9-5, 9-17
802.1X with VLAN assignment 9-6, 9-11
802.1X with voice VLAN 9-6
encapsulation 9-2
initiation and message exchange 9-3
method lists 9-11
ports
authorization state and dot1x port-control command 9-4
authorized and unauthorized 9-4
resetting to default values 9-18
software upgrade changes 9-11
support for 1-5
switch
as proxy 9-2
RADIUS client 9-2
topologies, supported 9-4
port blocking 1-2, 21-6
port-channel
See EtherChannel
Port Fast
described 18-2
enabling 18-14
mode, spanning tree 12-30
support for 1-3
port membership modes, VLAN 12-3
port priority
MSTP 17-17
STP 16-17
ports
802.1Q tunnel 12-3
access 10-3
blocking 21-6
dynamic access 12-3
forwarding, resuming 21-7
protected 21-5
routed 10-4
secure 21-8
static-access 12-3, 12-11
switch 10-2
trunks 12-3, 12-16
VLAN assignments 12-11
port security
aging 21-14
and QoS trusted boundary 29-32
and trunk ports 21-11
configuring 21-11
default configuration 21-10
described 21-8
displaying 21-16
sticky learning 21-8
violations 21-9
with other features 21-10
port-shutdown response, VMPS 12-27
power, inline 10-14
preferential treatment of traffic
See QoS
prefix lists, BGP 31-55
preventing unauthorized access 8-1
priority
HSRP 32-6
overriding CoS 14-5
trusting CoS 14-6
private VLAN edge ports
See protected ports
privileged EXEC mode 2-2
privilege levels
changing the default for lines 8-9
command switch 6-26
exiting 8-10
logging into 8-10
mapping on member switches 6-26
overview 8-2, 8-8
setting a command with 8-8
protected ports 1-4, 21-5
protocol-dependent modules, EIGRP 31-39
Protocol-Independent Multicast Protocol
See PIM
provider edge devices 31-65
proxy ARP
configuring 31-10
definition 31-8
with IP routing disabled 31-11
pruning, VTP
enabling 13-13
enabling on a port 12-22
examples 13-5
overview 13-4
pruning-eligible list
changing 12-22
for VTP pruning 13-4
VLANs 13-14
publications, related xxxvi
PVST+
802.1Q trunking interoperability 16-10
described 16-9
instances supported 16-9
Q
QoS
auto-QoS
categorizing traffic 29-18
configuration and defaults display 29-22
configuration guidelines 29-20
described 29-17
displaying 29-22
effects on NVRAM configuration 29-20
egress queue defaults 29-18
enabling for VoIP 29-21
basic model 29-4
classification
class maps, described 29-7
defined 29-4
flowchart 29-6
forwarding treatment 29-3
in frames and packets 29-3
IP ACLs, described 29-5, 29-7
MAC ACLs, described 29-5, 29-7
pass-through mode, described 29-33
per physical port 29-39
per-port per-VLAN 29-41
policy maps, described 29-7
port default, described 29-5
trust DSCP, described 29-5
trusted CoS, described 29-5
trust IP precedence, described 29-5
types for IP traffic 29-5
types for non-IP traffic 29-5
class maps
configuring per physical port 29-39
configuring per-port per-VLAN 29-41
displaying 29-69
configuration examples
distribution layer 29-72
existing wiring closet 29-70
intelligent wiring closet 29-71
configuration guidelines
auto-QoS 29-20
standard QoS 29-26
configuring
aggregate policers 29-49
auto-QoS 29-17
default port CoS value 29-31
DSCP maps 29-51
DSCP trust states bordering another domain 29-34
egress queues on 10/100 Ethernet ports 29-64
egress queues on Gigabit-capable Ethernet ports 29-57
IP extended ACLs 29-37
IP standard ACLs 29-36
MAC ACLs 29-38
pass-through mode 29-33
policy maps 29-43
port trust states within the domain 29-29
trusted boundary 29-32
default auto configuration 29-18
default standard configuration 29-25
displaying statistics 29-69
enabling globally 29-28
flowcharts
classification 29-6
policing and marking 29-10
queueing and scheduling 29-12, 29-15
implicit deny 29-7
IP phones
automatic classification and queueing 29-17
detection and trusted settings 29-17, 29-32
mapping tables
CoS-to-DSCP 29-52
CoS-to-egress-queue 29-57
displaying 29-69
DSCP-to-CoS 29-54
DSCP-to-DSCP-mutation 29-55
DSCP-to-threshold 29-60
IP-precedence-to-DSCP 29-52
policed-DSCP 29-53
types of 29-10
marked-down actions 29-46
marking, described 29-4, 29-8
overview 29-2
packet modification 29-17
pass-through mode 29-33
policers
configuring 29-46, 29-49
described 29-8
displaying 29-69
number of 29-9
types of 29-8
policies, attaching to an interface 29-9
policing
described 29-4, 29-8
token bucket algorithm 29-8
policy maps
characteristics of 29-43
configuring 29-43
displaying 29-69
queueing, defined 29-4
queues
CoS-to-egress-queue map 29-57
for 10/100 Ethernet ports 29-15
high priority (expedite) 29-13, 29-62
minimum-reserve levels 29-65
serviced by WRR 29-13, 29-16
size of 29-12, 29-15
size ratios 29-58
tail-drop threshold percentages 29-13, 29-59
WRED drop-percentage thresholds 29-13, 29-61
WRR scheduling 29-63
scheduling
allocating bandwidth on 10/100 Ethernet ports 29-67
allocating bandwidth on Gigabit-capable ports 29-63
defined 29-4
support for 1-5
tail drop
configuring drop threshold percentages 29-59
described 29-13
trust states
bordering another domain 29-34
described 29-5
trusted device 29-32
within the domain 29-29
WRED
configuring drop-percentage thresholds 29-61
described 29-14
WRR scheduling 29-63
quality of service
See QoS
queries, IGMP 20-3
R
RADIUS
attributes
vendor-proprietary 8-31
vendor-specific 8-29
configuring
accounting 8-28
authentication 8-23
authorization 8-27
communication, global 8-21, 8-29
communication, per-server 8-20, 8-21
multiple UDP ports 8-21
default configuration 8-20
defining AAA server groups 8-25
displaying the configuration 8-31
identifying the server 8-20
in clusters 6-17
limiting the services to the user 8-27
method list, defined 8-20
operation of 8-19
overview 8-18
suggested network environments 8-18
tracking services accessed by user 8-28
Random Early Detection, described 29-14
range
macro 10-10
of interfaces 10-8
rapid convergence 17-7
rapid per-VLAN spanning-tree plus
See rapid PVST+
rapid PVST+
802.1Q trunking interoperability 16-10
described 16-9
instances supported 16-9
rapid-PVST+ 12-2
Rapid Spanning Tree Protocol
See RSTP
RARP 31-8
rcommand command 6-25
RCP
configuration files
downloading B-16
overview B-15
preparing the server B-15
uploading B-17
image files
deleting old image B-31
downloading B-29
preparing the server B-28
uploading B-31
reconfirmation interval, VMPS, changing 12-33
recovery procedures 37-1
redundancy
EtherChannel 30-2
features 1-3
HSRP 32-1
STP
backbone 16-7
multidrop backbone 18-5
path cost 12-25
port priority 12-24
redundant clusters
See cluster standby group
redundant links and UplinkFast 18-17
reliable transport protocol, EIGRP 31-38
reloading software 4-17
Remote Authentication Dial-In User Service
See RADIUS
Remote Copy Protocol
See RCP
Remote Network Monitoring
See RMON
report suppression, IGMP
described 20-5
disabling 20-11
resets, in BGP 31-50
resetting a UDLD-shutdown interface 23-6
restricting access
NTP services 7-7
overview 8-1
passwords and privilege levels 8-2
RADIUS 8-18
TACACS+ 8-10
retry count, VMPS, changing 12-33
reverse address resolution 31-8
Reverse Address Resolution Protocol
See RARP
RFC
1058, RIP 31-19
1112, IP multicast and IGMP 20-2
1157, SNMPv1 27-2
1163, BGP 31-44
1166, IP addresses 31-5
1253, OSPF 31-29
1267, BGP 31-44
1305, NTP 7-2
1587, NSSAs 31-29
1757, RMON 25-2
1771, BGP 31-44
1901, SNMPv2C 27-2
1902 to 1907, SNMPv2 27-2
2236, IP multicast and IGMP 20-2
2273-2275, SNMPv3 27-2
RIP
advertisements 31-19
authentication 31-22
configuring 31-20
default configuration 31-19
described 31-19
hop counts 31-19
split horizon 31-22
summary addresses 31-22
support for 1-6
RMON
default configuration 25-3
displaying status 25-6
enabling alarms and events 25-3
groups supported 25-2
overview 25-1
statistics
collecting group Ethernet 25-5
collecting group history 25-5
support for 1-7
root guard
described 18-12
enabling 18-21
support for 1-4
root switch
MSTP 17-14
STP 16-14
route calculation timers, OSPF 31-35
route dampening, BGP 31-62
routed packets, ACLs on 28-39
routed ports
configuring 31-3
defined 10-4
in switch clusters 6-10
IP addresses on 10-18, 31-3
route-map command, for policy-based routing 31-84
route maps, BGP 31-53
route maps, policy-based routing, defined 31-83
router ACLs 28-2
route reflectors, BGP 31-61
router ID, OSPF 31-36
route selection, BGP 31-51
route summarization, OSPF 31-34
route targets, VPN 31-67
routing
default 31-2
dynamic 31-2
redistribution of information 31-79
static 31-2
routing domain confederation, BGP 31-60
Routing Information Protocol
See RIP
routing protocol administrative distances 31-77
RSPAN
configuration guidelines 24-16
default configuration 24-8
destination ports 24-5
displaying status 24-23
IDS 24-2
interaction with other features 24-7
monitored ports 24-4
monitoring ports 24-5
overview 1-7, 24-1
received traffic 24-3
reflector port 24-5
session limits 24-8
sessions
creating 24-17
defined 24-3
limiting source traffic to specific VLANs 24-22
monitoring VLANs 24-21
removing source (monitored) ports 24-20
specifying monitored ports 24-17
source ports 24-4
transmitted traffic 24-4
VLAN-based 24-6
RSTP
active topology, determining 17-6
BPDU
format 17-9
processing 17-10
designated port, defined 17-6
designated switch, defined 17-6
interoperability with 802.1D
described 17-5
restarting migration process 17-22
topology changes 17-10
overview 17-6
port roles
described 17-6
synchronized 17-8
proposal-agreement handshake process 17-7
rapid convergence
described 17-7
edge ports and Port Fast 17-7
point-to-point links 17-7, 17-22
root ports 17-7
root port, defined 17-6
See also MSTP
running configuration, saving 4-10
S
SC (standby command switch) 6-13, 6-23
scheduled reloads 4-17
SDM
configuring 7-30
described 7-27
templates
number of 7-27
resources used for Fast Ethernet switches 7-28
resources used for Gigabit Ethernet switches 7-28
sdm prefer extended-match command 31-68
secure ports, configuring 21-8
secure remote connections 8-38
Secure Shell
See SSH
security, port 21-8
security features 1-4
sequence numbers in log messages 26-8
server mode, VTP 13-3
service-provider network
MSTP and RSTP 17-1
service-provider networks
and 802.1Q tunneling 15-1
and customer VLANs 15-2
Layer 2 protocols across 15-7
Layer 2 protocol tunneling for EtherChannels 15-9
set-request operation 27-4
setup program, failed command switch replacement 37-7, 37-8
severity levels, defining in system messages 26-8
show access-lists hw-summary command 28-7
show cdp traffic command 22-5
show cluster members command 6-25
show configuration command 10-17
show fm command 28-43
show forward command 37-19
show interfaces command 10-14, 10-17
show l2protocol command 15-12, 15-14, 15-15
show mac access-group command 28-28
show running-config command
displaying ACLs 28-20, 28-30, 28-33
interface description in 10-17
show tcam command 28-43
shutdown command on interfaces 10-22
shutdown threshold for Layer 2 protocol packets 15-10
Simple Network Management Protocol
See SNMP
SmartPort macros
configuration guidelines 11-2
creating and applying 11-3
default configuration 11-2
defined 11-1
displaying 11-4
tracing 11-2
SNAP 22-1
SNMP
accessing MIB variables with 27-4
agent
described 27-4
disabling 27-7
community strings
configuring 27-7
for cluster switches 27-4
overview 27-4
configuration examples 27-16
default configuration 27-6
groups 27-9
in-band management 1-3
in clusters 6-17
informs
and trap keyword 27-11
described 27-5
differences from traps 27-5
enabling 27-13
limiting access by TFTP servers 27-15
limiting system log messages to NMS 26-10
manager functions 1-8, 27-3
managing clusters with 6-26
MIBs
location of A-3
supported A-1
notifications 27-5
overview 27-1, 27-4
status, displaying 27-17
system contact and location 27-15
trap manager, configuring 27-12, 27-14
traps
described 27-3, 27-5
differences from informs 27-5
enabling 27-11, 27-14
enabling MAC address notification 7-23
overview 27-1, 27-4
types of 27-11
users 27-9
versions supported 27-2
snooping, IGMP 20-1
software images
location in Flash B-19
recovery procedures 37-2
scheduling reloads 4-17
tar file format, described B-19
See also downloading and uploading
source addresses, in ACLs 28-12
SPAN
configuration guidelines 24-9
default configuration 24-8
destination ports 24-5
displaying status 24-23
IDS 24-2
interaction with other features 24-7
monitored ports 24-4
monitoring ports 24-5
overview 1-7, 24-1
received traffic 24-3
session limits 24-8
sessions
creating 24-10
defined 24-3
limiting source traffic to specific VLANs 24-15
monitoring VLANs 24-14
removing destination (monitoring) ports 24-13
removing source (monitored) ports 24-13
specifying monitored ports 24-10
source ports 24-4
transmitted traffic 24-4
VLAN-based 24-6
spanning tree and native VLANs 12-18
Spanning Tree Protocol
See STP
speed, configuring on interfaces 10-13
split horizon
IGRP 31-28
RIP 31-22
SSH
configuring 8-39
cryptographic software image 8-37
described 8-38
encryption methods 8-38
user authentication methods, supported 8-38
Stack Membership Discovery Protocol 18-6
Standby Command Configuration window 6-24
standby command switch
configuring 6-22
considerations 6-13
defined 6-2
priority 6-13
requirements 6-3
virtual IP address 6-13
See also cluster standby group and HSRP
standby group, cluster
See cluster standby group and HSRP
standby ip command 32-5
standby router 32-1
standby timers, HSRP 32-9
startup configuration
booting
manually 4-13
specific image 4-14
clearing B-18
configuration file
automatically downloading 4-12
specifying the filename 4-13
default boot configuration 4-12
static access ports
assigning to VLAN 12-11
defined 10-3, 12-3
static addresses
See addresses
static IP routing 1-6
static MAC addressing 1-4
static routes, configuring 31-77
static routing 31-2
static VLAN membership 12-2
statistics
802.1X 9-19
CDP 22-5
interface 10-20
IP multicast routing 34-58
OSPF 31-37
QoS ingress and egress 29-69
RMON group Ethernet 25-5
RMON group history 25-5
SNMP input and output 27-17
VTP 13-15
sticky learning
configuration file 21-8
defined 21-8
disabling 21-8
enabling 21-8
saving addresses 21-8
storm control
configuring 21-3
described 21-1
displaying 21-16
thresholds 21-2
STP
accelerating root port selection 18-4
BackboneFast
described 18-10
enabling 18-20
BPDU filtering
described 18-3
enabling 18-16
BPDU guard
described 18-3
enabling 18-15
BPDU message exchange 16-2
configuration guidelines 16-12, 18-14
configuring
forward-delay time 16-22
hello time 16-21
in cascaded stack 16-23
maximum aging time 16-22
path cost 16-18
port priority 16-17
root switch 16-14
secondary root switch 16-16
spanning-tree mode 16-13
switch priority 16-20
counters, clearing 16-24
cross-stack UplinkFast
described 18-5
enabling 18-19
default configuration 16-11
default optional feature configuration 18-14
designated port, defined 16-3
designated switch, defined 16-3
detecting indirect link failures 18-10
disabling 16-14
displaying status 16-24
EtherChannel guard
described 18-12
enabling 18-20
extended system ID
affects on root switch 16-14
affects on the secondary root switch 16-16
overview 16-3
unexpected behavior 16-15
features supported 1-3
inferior BPDU 16-3
instances supported 16-9
interface state, blocking to forwarding 18-2
interface states
blocking 16-5
disabled 16-6
forwarding 16-5, 16-6
learning 16-6
listening 16-6
overview 16-4
interoperability and compatibility among modes 16-10
Layer 2 protocol tunneling 15-7
limitations with 802.1Q trunks 16-10
load sharing
overview 12-23
using path costs 12-25
using port priorities 12-24
loop guard
described 18-13
enabling 18-21
modes supported 16-9
multicast addresses, affect of 16-8
optional features supported 1-3
overview 16-2
path costs 12-25, 12-26
Port Fast
described 18-2
enabling 18-14
port priorities 12-24
preventing root switch selection 18-12
protocols supported 16-9
redundant connectivity 16-7
root guard
described 18-12
enabling 18-21
root port, defined 16-3
root switch
affects of extended system ID 16-3, 16-14
configuring 16-14
election 16-3
unexpected behavior 16-15
settings in a cascaded stack 16-23
shutdown Port Fast-enabled port 18-3
superior BPDU 16-3
timers, described 16-20
UplinkFast
described 18-4
enabling 18-17
VLAN-bridge 16-10
stratum, NTP 7-2
stub areas, OSPF 31-33
subnet mask 31-5
subnet zero 31-6
summer time 7-13
SunNet Manager 1-8
supernet 31-7
SVIs
and IP unicast routing 31-3
and router ACLs 28-3
connecting VLANs 10-6
defined 10-4
routing between VLANs 12-2
switch clustering technology
See clusters, switch
switch console port 1-3
switched packets, ACLs on 28-37
switched ports 10-2
Switch Manager 3-14
See also Device Manager
switchport block multicast command 21-6
switchport block unicast command 21-6
switchport command 10-11
switchport mode dot1q-tunnel command 15-6
switchport protected command 21-5
switch priority
MSTP 17-19
STP 16-20
switch software features 1-1
switch virtual interface
See SVI
synchronization, BGP 31-48
syslog
See system message logging
system clock
configuring
daylight saving time 7-13
manually 7-11
summer time 7-13
time zones 7-12
displaying the time and date 7-11
overview 7-1
See also NTP
System Database Management
See SDM
system message logging
default configuration 26-3
defining error message severity levels 26-8
disabling 26-4
displaying the configuration 26-12
enabling 26-4
facility keywords, described 26-12
level keywords, described 26-9
limiting messages 26-10
message format 26-2
overview 26-1
sequence numbers, enabling and disabling 26-8
setting the display destination device 26-4
synchronizing log messages 26-6
syslog facility 1-7
time stamps, enabling and disabling 26-7
UNIX syslog servers
configuring the daemon 26-11
configuring the logging facility 26-11
facilities supported 26-12
system MTU
802.1Q tunneling 15-5
maximums 15-5
system name
default configuration 7-15
default setting 7-15
manual configuration 7-15
See also DNS
system prompt
default setting 7-15
manual configuration 7-16
system resource templates 7-27
system routes, IGRP 31-24
T
TACACS+
accounting, defined 8-11
authentication, defined 8-11
authorization, defined 8-11
configuring
accounting 8-17
authentication key 8-13
authorization 8-16
login authentication 8-14
default configuration 8-13
displaying the configuration 8-17
identifying the server 8-13
in clusters 6-17
limiting the services to the user 8-16
operation of 8-12
overview 8-10
support for 1-5
tracking services accessed by user 8-17
tagged packets
802.1Q 15-3
Layer 2 protocol 15-7
tail drop
described 29-13
support for 1-6
tar files
creating B-5
displaying the contents of B-6
extracting B-7
image file format B-19
TCAMs
ACL regions 28-47
ACLs not loading in 28-45
allocations, monitoring 28-48
monitoring usage 28-47
Telnet
accessing management interfaces 2-10
from a browser 2-10
number of connections 1-3
setting a password 8-6
templates, system resources 7-27
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password 8-6
ternary content addressable memory. See TCAM
TFTP
configuration files
downloading B-10
preparing the server B-10
uploading B-11
configuration files in base directory 4-6
configuring for autoconfiguration 4-6
image files
deleting B-22
downloading B-21
preparing the server B-20
uploading B-23
limiting access by servers 27-15
TFTP server 1-2
threshold, traffic level 21-2
time
See NTP and system clock
time-range command 28-17
time ranges in ACLs 28-17
time stamps in log messages 26-7
time zones 7-12
Token Ring VLANs
support for 12-5
VTP support 13-4
Topology view
described 3-2, 3-14
TOS 1-5
traceroute, Layer 2
and ARP 37-15
and CDP 37-15
described 37-14
IP addresses and subnets 37-15
MAC addresses and VLANs 37-15
multicast traffic 37-15
multiple devices on a port 37-15
unicast traffic 37-14
usage guidelines 37-15
traceroute command 37-13
See also IP traceroute
traffic
blocking flooded 21-6
fragmented 28-5
unfragmented 28-5
traffic policing 1-5
traffic suppression 21-2
transparent mode, VTP 13-3, 13-11
trap-door mechanism 4-2
traps
configuring MAC address notification 7-23
configuring managers 27-11, 27-14
defined 27-3
enabling 7-23, 27-11, 27-14
notification types 27-11
overview 27-1, 27-4
troubleshooting
connectivity problems 37-11
detecting unidirectional links 23-1
determining packet disposition 37-19
displaying crash information 37-20
GBIC security and identification 37-10
PIMv1 and PIMv2 interoperability problems 34-28
show forward command 37-19
with CiscoWorks 27-4
with debug commands 37-16
with ping 37-11
with system message logging 26-1
with traceroute 37-13
trunking encapsulation 1-4
trunk ports
configuring 12-20
defined 10-3, 12-3
encapsulation 12-20, 12-25, 12-26
trunks
allowed-VLAN list 12-21
configuring 12-20, 12-25, 12-26
ISL 12-16
load sharing
setting STP path costs 12-25
using STP port priorities 12-24
native VLAN for untagged traffic 12-23
parallel 12-25
pruning-eligible list 12-22
to non-DTP device 12-16
understanding 12-16
VLAN 1 minimization 12-21
trusted boundary for QoS 29-32
tunneling
802.1Q 15-1
defined 15-1
Layer 2 protocol 15-7
tunnel ports
802.1Q, configuring 15-6
802.1Q and ACLs 28-3
defined 12-3
described 10-4, 15-1
incompatibilities with other features 15-5
twisted-pair Ethernet, detecting unidirectional links 23-1
type of service
See TOS
U
UDLD
default configuration 23-4
echoing detection mechanism 23-3
enabling
globally 23-5
per interface 23-5
Layer 2 protocol tunneling 15-9
link-detection mechanism 23-1
neighbor database 23-2
overview 23-1
resetting an interface 23-6
status, displaying 23-7
support for 1-3
UDP, configuring 31-15
unauthorized ports with 802.1X 9-4
unequal-cost load balancing, IGRP 31-25
unicast MAC address filtering
and adding static addresses 7-26
and broadcast MAC addresses 7-26
and CPU packets 7-26
and multicast addresses 7-26
and router MAC addresses 7-26
configuration guidelines 7-26
described 7-26
unicast storm control command 21-4
unicast storms 21-1
unicast traffic, blocking 21-6
UniDirectional Link Detection protocol
See UDLD
UNIX syslog servers
daemon configuration 26-11
facilities supported 26-12
message logging configuration 26-11
unrecognized Type-Length-Value (TLV) support 13-4
upgrading software images
See downloading
UplinkFast
described 18-4
enabling 18-17
support for 1-3
uploading
configuration files
preparing B-10, B-12, B-15
reasons for B-8
using FTP B-14
using RCP B-17
using TFTP B-11
image files
preparing B-20, B-24, B-28
reasons for B-18
using FTP B-26
using RCP B-31
using TFTP B-23
User Datagram Protocol
See UDP
user EXEC mode 2-2
username-based authentication 8-7
V
version-dependent transparent mode 13-4
virtual IP address
cluster standby group 6-13, 6-23
command switch 6-13, 6-23
See also IP addresses
Virtual Private Network
See VPN
virtual router 32-1, 32-3
vlan.dat file 12-4
VLAN 1 minimization, support for 1-4
VLAN ACLs
See VLAN maps
VLAN configuration
at bootup 12-7
saving 12-7
VLAN configuration mode 2-2, 12-6
VLAN database
and startup configuration file 12-7
and VTP 13-1
VLAN configuration saved in 12-7
VLANs saved in 12-4
vlan database command 12-6
vlan dot1q tag native command 15-4
vlan global configuration command 12-6
VLAN management domain 13-2
VLAN Management Policy Server
See VMPS
VLAN map entries, order of 28-30
VLAN maps
applying 28-33
common uses for 28-33
configuration example 28-34
configuration guidelines 28-30
configuring 28-29
creating 28-30
defined 28-2
denying access example 28-35
denying and permitting packets 28-31
displaying 28-42
examples 28-35
support for 1-5
usage 28-4
VLAN membership
confirming 12-32
modes 12-3
VLAN Query Protocol
See VQP
VLANs
adding 12-8
adding to VLAN database 12-8
aging dynamic addresses 16-8
allowed on trunk 12-21
and spanning-tree instances 12-2, 12-6, 12-13
configuration guidelines, normal-range VLANs 12-5
configuration options 12-6
configuring 12-1
configuring IDs 1006 to 4094 12-12
connecting through SVIs 10-6
creating in config-vlan mode 12-8
creating in VLAN configuration mode 12-9
customer numbering in service-provider networks 15-3
default configuration 12-7
deleting 12-10
described 10-2, 12-1
displaying 12-15
extended-range 12-1, 12-12
features 1-4
illustrated 12-2
internal 12-13
limiting source traffic with RSPAN 24-22
limiting source traffic with SPAN 24-15
modifying 12-8
monitoring with RSPAN 24-21
monitoring with SPAN 24-14
native, configuring 12-23
normal-range 12-1, 12-4
number supported 1-4
parameters 12-4
port membership modes 12-3
static-access ports 12-11
STP and 802.1Q trunks 16-10
supported 12-2
Token Ring 12-5
traffic between 12-2
trunks, VLAN 1 minimization 12-21
VLAN-bridge STP 16-10, 36-1
VTP modes 13-3
VLAN Trunking Protocol
See VTP
VLAN trunks 12-16
VMPS
administering 12-34
configuration example 12-35
configuration guidelines 12-30
default configuration 12-30
description 12-27
dynamic port membership
described 12-28
reconfirming 12-33
troubleshooting 12-34
entering server address 12-31
mapping MAC addresses to VLANs 12-27
monitoring 12-34
reconfirmation interval, changing 12-33
reconfirming membership 12-32
retry count, changing 12-33
voice VLAN
Cisco 7960 phone, port connections 14-1
configuration guidelines 14-3
configuring IP phones for data traffic
override CoS of incoming frame 14-5
trust CoS priority of incoming frame 14-6
configuring ports for voice traffic in
802.1P priority tagged frames 14-4
802.1Q frames 14-4
connecting to an IP phone 14-3
default configuration 14-2
described 14-1
displaying 14-6
VPN
configuring routing in 31-70
forwarding 31-67
in service provider networks 31-65
routes 31-65
VPN routing and forwarding table
See VRF
VQP 1-4, 12-27
VRF
defining 31-67
tables 31-65
VTP
adding a client to a domain 13-14
advertisements 12-19, 13-3
and extended-range VLANs 13-1
and normal-range VLANs 13-1
client mode, configuring 13-10
configuration
global configuration mode 13-7
guidelines 13-8
privileged EXEC mode 13-7
requirements 13-9
saving 13-7
VLAN configuration mode 13-7
configuration mode options 13-7
configuration requirements 13-9
configuration revision number
guideline 13-14
resetting 13-14
configuring
client mode 13-10
server mode 13-9
transparent mode 13-11
consistency checks 13-4
default configuration 13-6
described 13-1
disabling 13-11
domain names 13-8
domains 13-2
Layer 2 protocol tunneling 15-7
modes
client 13-3, 13-10
server 13-3, 13-9
transitions 13-3
transparent 13-3, 13-11
monitoring 13-15
passwords 13-8
pruning
disabling 13-13
enabling 13-13
examples 13-5
overview 13-4
support for 1-4
pruning-eligible list, changing 12-22
server mode, configuring 13-9
statistics 13-15
support for 1-4
Token Ring support 13-4
transparent mode, configuring 13-11
using 13-1
version, guidelines 13-8
version 1 13-4
version 2
configuration guidelines 13-8
disabling 13-13
enabling 13-12
overview 13-4
W
WCCP
authentication 33-4
configuration guidelines 33-5
default configuration 33-5
described 33-2
displaying 33-9
enabling 33-6
features unsupported 33-4
forwarding method 33-3
Layer-2 header rewrite 33-3
MD5 security 33-4
message exchange 33-3
monitoring and maintaining 33-9
negotiation 33-3
packet redirection 33-4
packet-return method 33-3
redirecting traffic received from a client 33-6
setting the password 33-6
unsupported WCCPv2 features 33-4
Web Cache Communication Protocol
See WCCP
Weighted Random Early Detection
See WRED
Weighted Round Robin
See WRR
weighted round robin, described 29-4
wizards 1-9, 3-6
WRED 1-6, 29-14
WRR 1-6, 29-4
X
XMODEM protocol 37-2