Catalyst 3750 Metro Switch Software Configuration Guide, 12.1(14)AX
Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

802.1D

See STP

802.1p     12-1

802.1Q

and trunk ports     9-3

configuration limitations     10-19

encapsulation     10-16

native VLAN for untagged traffic     10-24

tunneling

compatibility with other features     13-6

defaults     13-4

described     13-2

tunnel ports with other features     13-6

802.1s

See MSTP

802.1w

See RSTP

802.1x

See port-based authentication

802.3ad

See EtherChannel

802.3z flow control     9-15

A

abbreviating commands     2-4

ABRs     28-28

access-class command     25-17

access control entries

See ACEs

access-denied response, VMPS     10-28

access groups

applying ACLs to interfaces     25-18

IP     25-19

Layer 2     25-18

Layer 3     25-19

access lists

See ACLs

access ports

and Layer 2 protocol tunneling     13-12

defined     9-2

accounting

with RADIUS     7-28

with TACACS+     7-11, 7-16

ACEs

and QoS     26-8

defined     25-2

Ethernet     25-2

IP     25-2

ACLs

ACEs     25-2

any keyword     25-11

applying

on bridged packets     25-36

on multicast packets     25-37

on routed packets     25-36

on switched packets     25-35

time ranges to     25-15

to an interface     25-18

to QoS     26-8

classifying traffic for QoS     26-49

comments in     25-17

compiling     25-20

configuring with VLAN maps     25-34

ACLs (continued)

defined     25-1, 25-6

examples of     25-20, 26-49

extended IP

configuring for QoS classification     26-50

creating     25-9

matching criteria     25-6

hardware and software handling     25-19

host keyword     25-11

IP

applying to interfaces     25-18

creating     25-6

fragments and QoS guidelines     26-40

implicit deny     25-8, 25-12, 25-14

implicit masks     25-8

matching criteria     25-6

named     25-13

terminal lines, setting on     25-17

undefined     25-19

violations, logging     25-14

limiting actions     25-35

logging messages     25-9

log keyword     25-14

MAC extended     25-25, 26-51

matching     25-6, 25-19

monitoring     25-38

named     25-13

number per QoS class map     26-40

numbers     25-7

port     25-2

precedence of     25-2

QoS     26-8, 26-49

router     25-2

standard IP

configuring for QoS classification     26-49

creating     25-8

matching criteria     25-6

supported features     25-19

time ranges     25-15

ACLs (continued)

unsupported features     25-6

using router ACLs with VLAN maps     25-34

VLAN maps

configuration guidelines     25-28

configuring     25-27

active router     29-1

address aliasing     17-2

addresses

displaying the MAC address table     5-25

dynamic

accelerated aging     14-8

changing the aging time     5-22

default aging     14-8

defined     5-20

learning     5-21

removing     5-22

MAC, discovering     5-26

multicast

group address range     31-3

STP address management     14-8

static

adding and removing     5-24

defined     5-20

address resolution     5-26, 28-7

Address Resolution Protocol

See ARP

adjacency tables, with CEF     28-87

administrative distances

defined     28-98

OSPF     28-33

routing protocol defaults     28-89

advertisements

CDP     19-1

IGRP     28-23

RIP     28-18

VTP     10-20, 11-3

aggregate addresses, BGP     28-58

aggregated ports

See EtherChannel

aggregate policers     26-57

aging, accelerating     14-8

aging time

accelerated

for MSTP     15-20

for STP     14-8, 14-21

MAC address table     5-22

maximum

for MSTP     15-21

for STP     14-21

alarms, RMON     22-3

allowed-VLAN list     10-22

alternate routes, IGRP     28-24

Any Transport over MPLS

See AToM

area border routers

See ABRs

area routing

IS-IS     28-63

ISO IGRP     28-63

ARP

configuring     28-8

defined     5-26, 28-8

encapsulation     28-9

static cache configuration     28-8

ARP table

address resolution     5-26

managing     5-26

ASBRs     28-28

AS-path filters, BGP     28-53

asymmetrical links, and 802.1Q tunneling     13-4

AToM     30-12

attributes, RADIUS

vendor-proprietary     7-30

vendor-specific     7-29

audience     xxxiii

authentication

EIGRP     28-41

HSRP     29-8

Kerberos     7-31

local mode with AAA     7-36

NTP associations     5-5

RADIUS

key     7-21

login     7-23

See also port-based authentication

TACACS+

defined     7-11

key     7-13

login     7-14

authentication keys, and routing protocols     28-99

authoritative time source, described     5-2

authorization

with RADIUS     7-27

with TACACS+     7-11, 7-16

authorized ports with 802.1x     8-4

autoconfiguration     3-3

automatic QoS

See QoS

autonegotiation

interface configuration guidelines     9-13

mismatches     34-7

autonomous system boundary routers

See ASBRs

autonomous systems, in BGP     28-47

Auto-RP, described     31-5

auxiliary VLAN

See voice VLAN

availability features     1-3

B

BackboneFast

described     16-5

enabling     16-14

banners

configuring

login     5-20

message-of-the-day login     5-19

default configuration     5-18

when displayed     5-18

BGP

aggregate addresses     28-58

aggregate routes, configuring     28-58

CIDR     28-58

clear commands     28-62

community filtering     28-55

configuring neighbors     28-57

configuring routing sessions     30-9

default configuration     28-45

described     28-44

enabling     28-47

monitoring     28-62

multipath support     28-50

neighbors, types of     28-47

path selection     28-50

peers, configuring     28-57

prefix filtering     28-54

resetting sessions     28-49

route dampening     28-61

route maps     28-52

route reflectors     28-60

routing domain confederation     28-59

routing session with multi-VRF CE     28-81

show commands     28-62

supernets     28-58

Version 4     28-44

blocking packets     18-5

booting

boot loader, function of     3-2

boot process     3-1

manually     3-12

specific image     3-12

boot loader

accessing     3-13

described     3-2

environment variables     3-13

prompt     3-13

trap-door mechanism     3-2

bootstrap router (BSR), described     31-5

Border Gateway Protocol

See BGP

BPDU

error-disabled state     16-3

filtering     16-3

RSTP format     15-9

BPDU filtering

described     16-3

enabling     16-12

BPDU guard

described     16-3

enabling     16-11

bridged packets, ACLs on     25-36

bridge groups

See fallback bridging

bridge protocol data unit

See BPDU

broadcast flooding     28-15

broadcast packets

directed     28-12

flooded     28-12

broadcast storm-control command     18-3

broadcast storms     18-1, 28-12

bypass mode, Layer 2 protocol-tunneling     13-11, 13-13

C

cables, monitoring for unidirectional links     20-1

caution, described     xxxiv

CBWFQ

configuring

with DSCP-based WRED     26-89

with IP precedence-based WRED     26-93

with tail drop     26-86

described     26-28

CDP

and trusted boundary     26-46

configuring     19-2

default configuration     19-2

described     19-1

disabling for routing device     19-3, 19-4

enabling and disabling

on an interface     19-4

on a switch     19-3

Layer 2 protocol tunneling     13-10

monitoring     19-5

overview     19-1

transmission timer and holdtime, setting     19-2

updates     19-2

CEF     28-86

CGMP

as IGMP snooping learning method     17-7

clearing cached group entries     31-49

enabling server support     31-32

joining multicast group     17-2

overview     31-7

server support only     31-7

CIDR     28-58

Cisco 7960 IP Phone     12-1

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco Intelligence Engine 2100 Series Configuration Registrar

See IE2100

Cisco IOS File System     1-3

Cisco Networking Services

See IE2100

CiscoWorks 2000     1-2, 24-4

class-based weighted fair queueing

See CBWFQ

classless interdomain routing

See CIDR

classless routing     28-6

class maps for QoS

configuring

egress     26-78

ingress     26-52

described     26-8, 26-23

displaying     26-75, 26-101

class of service

See CoS

clearing interfaces     9-21

CLI

abbreviating commands     2-4

command modes     2-1

editing features

enabling and disabling     2-7

keystroke editing     2-7

wrapped lines     2-8

error messages     2-5

filtering command output     2-9

getting help     2-3

history

changing the buffer size     2-5

described     2-5

disabling     2-6

recalling commands     2-6

no and default forms of commands     2-4

client mode, VTP     11-3

CLNS

See ISO CLNS

clock

See system clock

command-line interface

See CLI

command modes     2-1

commands

abbreviating     2-4

no and default     2-4

setting privilege levels     7-8

community list, BGP     28-56

community strings

configuring     24-7

overview     24-4

config.text     3-11

configuration, initial

Express Setup     1-8

See also hardware installation guide

setup (CLI) program     1-8

configuration examples

ACLs and VLAN maps     25-29

IP ACLs     25-20

multi-VRF-CE     28-82

network     1-11

SNMP     24-14

VLAN maps     25-31

VMPS     10-29

configuration files

clearing the startup configuration     B-18

creating using a text editor     B-9

default name     3-11

deleting a stored configuration     B-19

described     B-8

downloading

automatically     3-11

preparing     B-10, B-12, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-16

using TFTP     B-11

guidelines for creating and using     B-8

invalid combinations when copying     B-5

configuration files (continued)

limiting TFTP server access     24-13

obtaining with DHCP     3-7

password recovery disable considerations     7-5

specifying the filename     3-11

system contact and location information     24-13

types and location     B-9

uploading

preparing     B-10, B-12, B-16

reasons for     B-8

using FTP     B-14

using RCP     B-17

using TFTP     B-11

configuration guidelines

802.1Q trunks     10-19

applying ACLs     25-18

applying MAC ACLs     25-26

auto-QoS     26-33

Auto-RP and BSR     31-9

EtherChannel     27-9

fallback bridging     33-3

hierarchical QoS     26-76

HSRP

authentication and timers     29-8

interfaces     29-4

priority     29-6

interface speed and duplex mode     9-13

IP multicast routing     31-8

MSTP     15-12, 16-9

multi-VRF CE     28-79

named ACLs     25-13

port-based authentication     8-11

port security     18-9

protected ports     18-5

router ACLs and VLAN maps     25-34

RSPAN     21-16

SDM templates     6-3

SNMP     24-6

SPAN     21-10

configuration guidelines (continued)

standard QoS     26-40

STP     14-12, 16-9

UDLD     20-4

VLAN maps     25-28

VLANs

extended-range     10-13

normal-range     10-6

VMPS     10-29

voice VLAN     12-3

VTP     11-8

configuration settings, saving     3-10

configure terminal command     9-7

config-vlan mode     2-2, 10-7

congestion-avoidance mechanisms

WRED     26-27, 26-89, 26-93

WTD     26-13, 26-65, 26-69

congestion management for QoS     26-27

connectionless service, and VPNs     30-3

connections, secure remote     7-37

connectivity problems     34-8, 34-10, 34-11

consistency checks in VTP version 2     11-4

console port, connecting to     2-10

conventions

command     xxxiv

for examples     xxxiv

publication     xxxiv

text     xxxiv

corrupted software, recovery steps with XMODEM     34-2

CoS

configuring the default port value     26-45

in Layer 2 frames     26-2

override priority     12-5

trust priority     12-5

CoS input queue threshold map for QoS     26-16

CoS output queue threshold map for QoS     26-19

CoS-to-DSCP map for QoS     26-59

counters, clearing interface     9-21

crashinfo file     34-17

cryptographic software image

Kerberos     7-31

SSH     7-37

customer edge devices

and Multi-VFR CE     28-76

and VPNs     30-3, 30-5

D

daylight saving time     5-13

debugging

enabling all system diagnostics     34-14

enabling for a specific feature     34-13

redirecting error message output     34-14

using commands     34-13

default commands     2-4

default configuration

802.1Q tunneling     13-4

802.1x     8-10

auto-QoS     26-30

banners     5-18

BGP     28-45

booting     3-11

CDP     19-2

DNS     5-17

EIGRP     28-38

EoMPLS     30-15

EtherChannel     27-9

fallback bridging     33-3

hierarchical QoS     26-76

HSRP     29-4

IGMP     31-26

IGMP filtering     17-19

IGMP snooping     17-5

IGRP     28-24

initial switch information     3-3

IP addressing, IP routing     28-4

IP multicast routing     31-8

IS-IS     28-67

default configuration (continued)

ISO IGRP     28-64

Layer 2 interfaces     9-11

Layer 2 protocol tunneling     13-13

MAC address table     5-21

MPLS     30-6

MPLS QoS     30-20

MSDP     32-4

MSTP     15-12

multi-VRF CE     28-78

MVR     17-14

NTP     5-4

optional spanning-tree features     16-9

OSPF     28-29

password and privilege level     7-2

RADIUS     7-20

RIP     28-18

RMON     22-3

RSPAN     21-9

SNMP     24-6

SPAN     21-9

standard QoS     26-38

STP     14-11

system message logging     23-3

system name and prompt     5-15

TACACS+     7-13

UDLD     20-4

VLAN, Layer 2 Ethernet interfaces     10-19

VLAN mapping     13-8

VLANs     10-8

VMPS     10-29

voice VLAN     12-3

VTP     11-6

default gateway     3-10, 28-10

default networks     28-89

default routes     28-89

default routing     28-2

deleting VLANs     10-11

description command     9-17

designing your network, examples     1-11

destination addresses, in ACLs     25-10

destination-IP address based forwarding, EtherChannel     27-7

destination-MAC address forwarding, EtherChannel     27-7

detecting indirect link failures, STP     16-6

device discovery protocol     19-1

DHCP-based autoconfiguration

client request message exchange     3-4

configuring

client side     3-3

DNS     3-6

relay device     3-6

server-side     3-5

TFTP server     3-5

example     3-8

lease options

for IP address information     3-5

for receiving the configuration file     3-5

overview     3-3

relationship to BOOTP     3-3

Differentiated Services architecture, QoS     26-2

Differentiated Services Code Point

See DSCP

Diffusing Update Algorithm (DUAL)     28-37

directories

changing     B-3

creating and removing     B-4

displaying the working     B-3

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols     28-2

distribute-list command     28-97

DNS

and DHCP-based autoconfiguration     3-6

default configuration     5-17

displaying the configuration     5-18

overview     5-16

setting up     5-17

documentation

feedback     xxxvi

obtaining, world wide web     xxxv

ordering     xxxvi

related     xxxv

document conventions     xxxiv

domain names

DNS     5-16

VTP     11-8

Domain Name System

See DNS

domains, ISO IGRP routing     28-63

dot1q-tunnel switchport mode     10-18

double-tagged packets

802.1Q tunneling     13-2

Layer 2 protocol tunneling     13-12

downloading

configuration files

preparing     B-10, B-12, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-16

using TFTP     B-11

image files

deleting old image     B-23

preparing     B-21, B-24, B-28

reasons for     B-19

using FTP     B-25

using RCP     B-29

using TFTP     B-22

drop threshold for Layer 2 protocol packets     13-13

DSCP     26-2

DSCP input queue threshold map for QoS     26-16

DSCP output queue threshold map for QoS     26-19

DSCP-to-CoS map for QoS     26-62

DSCP-to-DSCP-mutation map for QoS     26-63

DTP     10-17

DUAL finite state machine, EIGRP     28-37

duplex mode, configuring     9-12

DVMRP

autosummarization

configuring a summary address     31-46

disabling     31-48

connecting PIM domain to DVMRP router     31-38

enabling unicast routing     31-42

interoperability

with Cisco devices     31-36

with IOS software     31-7

mrinfo requests, responding to     31-41

neighbors

advertising the default route to     31-40

discovery with Probe messages     31-36

displaying information     31-41

prevent peering with nonpruning     31-44

rejecting nonpruning     31-43

overview     31-7

routes

adding a metric offset     31-48

advertising all     31-48

advertising the default route to neighbors     31-40

caching DVMRP routes learned in report messages     31-42

changing the threshold for syslog messages     31-45

deleting     31-49

displaying     31-50

favoring one over another     31-48

limiting the number injected into MBONE     31-45

limiting unicast route advertisements     31-36

routing table     31-7

source distribution tree, building     31-7

tunnels

configuring     31-38

displaying neighbor information     31-41

dynamic access ports

characteristics     10-4

configuring     10-31

defined     9-3

dynamic addresses

See addresses

dynamic auto trunking mode     10-18

dynamic desirable trunking mode     10-18

Dynamic Host Configuration Protocol

See DHCP-based autoconfiguration

dynamic port VLAN membership

described     10-29

reconfirming     10-31, 10-32

troubleshooting     10-33

types of connections     10-31

dynamic routing

ISO CLNS     28-63

protocols     28-2

Dynamic Trunking Protocol

See DTP

E

EBGP     28-43, 30-5

editing features

enabling and disabling     2-7

keystrokes used     2-7

wrapped lines     2-8

EIGRP

and IGRP     28-39

authentication     28-41

components     28-37

configuring     28-39

default configuration     28-38

definition     28-37

interface parameters, configuring     28-40

monitoring     28-42

enable password     7-3

enable secret password     7-3

encryption for passwords     7-3

Enhanced IGRP

See EIGRP

enhanced-services interfaces

See ES interfaces

environment variables, function of     3-14

EoMPLS

and 802.1Q tunneling     30-13

and Layer 2 protocol tunneling     30-14

and QoS     30-14

configuring     30-16

default configuration     30-15

limitations     30-14

monitoring     30-22

packet flow     30-17

QoS     30-18

equal-cost routing     28-87

error messages during command entry     2-5

ES interfaces     9-7, 30-1

EtherChannel

802.3ad, described     27-5

automatic creation of     27-4, 27-5

channel groups

binding physical and logical interfaces     27-3

numbering of     27-3

configuration guidelines     27-9

configuring

Layer 3 physical interfaces     27-13

Layer 3 port-channel logical interfaces     27-12

configuring Layer 2 interfaces     27-10

default configuration     27-9

described     27-2

displaying status     27-19

forwarding methods     27-6, 27-15

interaction

with STP     27-9

with VLANs     27-10

EtherChannel (continued)

LACP

described     27-5

displaying status     27-19

hot-standby ports     27-17

interaction with other features     27-6

modes     27-6

port priority     27-18

system priority     27-18

Layer 3 interface     28-3

load balancing     27-6, 27-15

logical interfaces, described     27-3

number of interfaces per     27-2

PAgP

aggregate-port learners     27-16

compatibility with Catalyst 1900     27-16

described     27-4

displaying status     27-19

interaction with other features     27-5

learn method and priority configuration     27-16

modes     27-4

silent mode     27-5

port-channel interfaces

described     27-3

numbering of     27-3

port groups     9-5

Ethernet over MPLS

See EoMPLS

Ethernet VLANs

creating     10-9

defaults and ranges     10-8

modifying     10-9

events, RMON     22-3

examples

conventions for     xxxiv

network configuration     1-11

experimental bits, setting MPLS priority with     30-20

Express Setup

See hardware installation guide

extended-range VLANs

configuration guidelines     10-13

configuring     10-12

creating     10-13, 10-14

defined     10-1

extended system ID

MSTP     15-14

STP     14-4, 14-14

Extensible Authentication Protocol over LAN     8-1

exterior routes, IGRP     28-23

external BGP

See EBGP

external neighbors, BGP     28-47

F

fallback bridging

and protected ports     33-3

bridge groups

creating     33-3

described     33-1

displaying     33-10

function of     33-2

number supported     33-4

removing     33-4

bridge table

clearing     33-10

displaying     33-10

configuration guidelines     33-3

connecting interfaces with     9-6

default configuration     33-3

described     33-1

frame forwarding

flooding packets     33-2

forwarding packets     33-2

overview     33-1

fallback bridging (continued)

STP

disabling on an interface     33-10

forward-delay interval     33-9

hello BPDU interval     33-8

interface priority     33-6

maximum-idle interval     33-9

path cost     33-7

VLAN-bridge spanning-tree priority     33-5

VLAN-bridge STP     33-2

SVIs and routed ports     33-1

VLAN-bridge STP     14-11, 33-1

features

availability     1-3

Layer 2 VPN services     1-4

Layer 3     1-7

Layer 3 VPN services     1-5

manageability     1-3

management options     1-2

monitoring     1-8

performance     1-2

QoS     1-6

security     1-5

VLAN     1-4

feedback to Cisco Systems, web     xxxvi

FIB     28-86

fiber-optic, detecting unidirectional links     20-1

files

copying     B-4

crashinfo

description     34-17

displaying the contents of     34-17

location     34-17

deleting     B-5

displaying the contents of     B-7

files (continued)

tar

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

file system

displaying available file systems     B-2

displaying file information     B-3

local file system names     B-1

network file system names     B-4

setting the default     B-3

filtering

in a VLAN     25-27

non-IP traffic     25-25

show and more command output     2-9

filters, IP

See ACLs, IP

flash device, number of     B-1

flash updates, IGRP     28-24

flooded traffic, blocking     18-6

flowcharts

QoS egress, two-rate policing and marking     26-24

QoS egress hierarchical queues queueing and scheduling     26-26

QoS egress queue-set queueing and scheduling     26-17

QoS ingress, single-rate policing and marking     26-11

QoS ingress classification     26-7

QoS ingress queueing and scheduling     26-15

flow control     9-15

forward-delay time

MSTP     15-20

STP     14-21

forwarding equivalence classes     30-2

Forwarding Information Base

See FIB

forwarding non-routable protocols     33-1

FTP

accessing MIB files     A-3

configuration files

downloading     B-13

overview     B-12

preparing the server     B-12

uploading     B-14

image files

deleting old image     B-27

downloading     B-25

preparing the server     B-24

uploading     B-27

G

get-bulk-request operation     24-3

get-next-request operation     24-3, 24-4

get-request operation     24-3, 24-4

get-response operation     24-3

global configuration mode     2-2

guest VLAN and 802.1x     8-8

guide

audience     xxxiii

purpose of     xxxiii

H

hardware limitations and Layer 3 interfaces     9-18

hello time

MSTP     15-19

STP     14-20

help, for the command line     2-3

hierarchical QoS

See QoS

history

changing the buffer size     2-5

described     2-5

disabling     2-6

recalling commands     2-6

history table, level and number of syslog messages     23-9

hosts, limit on dynamic ports     10-33

Hot Standby Router Protocol

See HSRP

HP OpenView     1-2

HSRP

authentication string     29-8

configuring     29-3

default configuration     29-4

definition     29-1

enabling     29-5

guidelines     29-4

monitoring     29-10

overview     29-1

priority     29-6

timers     29-8

tracking     29-6

I

IBGP     28-43, 30-5

ICMP

redirect messages     28-10

time exceeded messages     34-12

traceroute and     34-12

unreachable messages     25-18

unreachables and ACLs     25-19

ICMP ping

executing     34-9

overview     34-8

ICMP Router Discovery Protocol

See IRDP

IDS appliances

and ingress RSPAN     21-20

and ingress SPAN     21-13

IE2100

CNS embedded agents

described     4-5

enabling automated configuration     4-6

enabling configuration agent     4-9

enabling event agent     4-8

Configuration Registrar

configID, deviceID, hostname     4-3

configuration service     4-2

described     4-1

event service     4-3

IGMP

configuring the switch

as a member of a group     31-26

statically connected member     31-31

controlling access to groups     31-27

default configuration     31-26

deleting cache entries     31-50

displaying groups     31-50

fast switching     31-31

host-query interval, modifying     31-29

joining multicast group     17-2

join messages     17-2

leave processing, enabling     17-10

leaving multicast group     17-4

multicast reachability     31-26

overview     31-2

queries     17-3

Version 1

changing to Version 2     31-28

described     31-3

IGMP (continued)

Version 2

changing to Version 1     31-28

described     31-3

maximum query response time value     31-30

pruning groups     31-30

query timeout value     31-30

IGMP filtering

configuring     17-19

default configuration     17-19

described     17-19

monitoring     17-22

IGMP groups, setting the maximum number     17-21

IGMP profile

applying     17-20

configuration mode     17-19

configuring     17-20

IGMP snooping

and address aliasing     17-2

configuring     17-5

default configuration     17-5

definition     17-2

enabling and disabling     17-6

global configuration     17-6

Immediate Leave     17-5

method     17-6

monitoring     17-10

VLAN configuration     17-6

IGP     28-28

IGRP

advertisements     28-23

alternate routes     28-24

configuring     28-25

default configuration     28-24

described     28-23

exterior routes     28-23

flash updates     28-24

interior routes     28-23

load balancing     28-24

IGRP (continued)

poison-reverse updates     28-24

split horizon     28-27

system routes     28-23

traffic sharing     28-25

unequal-cost load balancing     28-24

Immediate-Leave, IGMP     17-5

initial configuration

defaults     1-8

Express Setup     1-8

See also hardware installation guide

setup (CLI) program     1-8

Intelligence Engine 2100 Series CNS Agents

See IE2100

interdomain routing, ISO IGRP     28-63

interface

number     9-7

range macros     9-9

interface command     9-6, 9-7

interface configuration mode     2-3

interfaces

configuration guidelines     9-13

configuring     9-7

configuring duplex mode     9-12

configuring speed     9-12

counters, clearing     9-21

described     9-17

descriptive name, adding     9-17

displaying information about     9-20

flow control     9-15

management     1-2

monitoring     9-20

naming     9-17

physical, identifying     9-6

range of     9-8

restarting     9-22

shutting down     9-22

supported     9-6

types of     9-1

interfaces range macro command     9-9

interface types     9-6

Interior Gateway Protocol

See IGP

Interior Gateway Routing Protocol

See IGRP

interior routes, IGRP     28-23

Intermediate-System-to-Intermediate-System protocol

See IS-IS

internal BGP

See IBGP

internal neighbors, BGP     28-47

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link

See ISL

inter-VLAN routing     28-2

Intrusion Detection System

See IDS appliances

ip access group command     25-19

IP ACLs

extended, creating     25-9

for QoS classification     26-8

implicit deny     25-8, 25-12, 25-14

implicit masks     25-8

logging     25-14

named     25-13

standard, creating     25-8

undefined     25-19

virtual terminal lines, setting on     25-17

IP addresses

classes of     28-5

default configuration     28-4

discovering     5-26

for IP routing     28-4

MAC address association     28-7

monitoring     28-16

IP broadcast address     28-15

ip cef command     28-87

IP directed broadcasts     28-13

ip igmp profile command     17-19

IP information

assigned

manually     3-9

through DHCP-based autoconfiguration     3-3

default configuration     3-3

IP multicast routing

addresses

all-hosts     31-3

all-multicast-routers     31-3

host group address range     31-3

administratively-scoped boundaries, described     31-34

and IGMP snooping     17-2

Auto-RP

adding to an existing sparse-mode cloud     31-14

benefits of     31-13

clearing the cache     31-50

configuration guidelines     31-9

filtering incoming RP announcement messages     31-16

overview     31-5

preventing candidate RP spoofing     31-16

preventing join messages to false RPs     31-15

setting up in a new internetwork     31-13

using with BSR     31-21

bootstrap router

configuration guidelines     31-9

configuring candidate BSRs     31-19

configuring candidate RPs     31-20

defining the IP multicast boundary     31-18

defining the PIM domain border     31-17

overview     31-5

using with Auto-RP     31-21

Cisco implementation     31-2

configuring

basic multicast routing     31-10

IP multicast boundary     31-34

IP multicast routing (continued)

default configuration     31-8

enabling

multicast forwarding     31-10

PIM mode     31-11

group-to-RP mappings

Auto-RP     31-5

BSR     31-5

MBONE

deleting sdr cache entries     31-50

described     31-33

displaying sdr cache     31-51

enabling sdr listener support     31-33

limiting DVMRP routes advertised     31-45

limiting sdr cache entry lifetime     31-34

SAP packets for conference session announcement     31-33

Session Directory (sdr) tool, described     31-33

monitoring

packet rate loss     31-51

peering devices     31-51

tracing a path     31-51

multicast forwarding, described     31-6

PIMv1 and PIMv2 interoperability     31-9

protocol interaction     31-2

reverse path check (RPF)     31-6

routing table

deleting     31-50

displaying     31-50

RP

assigning manually     31-12

configuring Auto-RP     31-13

configuring PIMv2 BSR     31-17

monitoring mapping information     31-22

using Auto-RP and BSR     31-21

statistics, displaying system and network     31-50

See also CGMP

See also DVMRP

IP multicast routing (continued)

See also IGMP

See also PIM

IP phones

and QoS     12-1

automatic classification and queueing     26-29

configuring     12-4

ensuring port security with QoS     26-46

trusted boundary for QoS     26-46

IP precedence     26-2

IP-precedence-to-DSCP map for QoS     26-60

IP protocols in ACLs     25-10

IP routes, monitoring     28-100

IP routing

connecting interfaces with     9-6

enabling     28-17

IP traceroute

executing     34-12

overview     34-11

IP unicast routing

address resolution     28-7

administrative distances     28-89, 28-98

ARP     28-8

assigning IP addresses to Layer 3 interfaces     28-5

authentication keys     28-99

broadcast

address     28-15

flooding     28-15

packets     28-12

storms     28-12

classless routing     28-6

configuring static routes     28-88

default

addressing configuration     28-4

gateways     28-10

networks     28-89

routes     28-89

routing     28-2

IP unicast routing (continued)

directed broadcasts     28-13

dynamic routing protocols     28-2

enabling     28-17

EtherChannel Layer 3 interface     28-3

IGP     28-28

inter-VLAN     28-2

IP addressing

classes     28-5

configuring     28-4

IRDP     28-11

Layer 3 interfaces     28-3

MAC address and IP address     28-7

passive interfaces     28-97

protocols

distance-vector     28-2

dynamic     28-2

link-state     28-2

proxy ARP     28-8

redistribution     28-90

reverse address resolution     28-7

routed ports     28-3

static routing     28-2

steps to configure     28-3

subnet mask     28-5

subnet zero     28-6

supernet     28-6

UDP     28-14

with SVIs     28-3

See also BGP

See also EIGRP

See also IGRP

See also IS-IS

See also OSPF

See also RIP

IRDP

configuring     28-11

definition     28-11

IS-IS

addresses     28-63

area routing     28-63

default configuration     28-67

monitoring     28-75

show commands     28-75

system routing     28-63

ISL

and trunk ports     9-3

encapsulation     10-16

trunking with 802.1 tunneling     13-5

ISO CLNS

clear commands     28-75

dynamic routing protocols     28-63

monitoring     28-75

NETs     28-63

NSAPs     28-63

OSI standard     28-63

ISO IGRP

area routing     28-63

configuring     28-64

default configuration     28-64

interdomain routing     28-63

optional parameters     28-66

routing processes     28-64

system routing     28-63

J

join messages, IGMP     17-2

K

Kerberos

authenticating to

boundary switch     7-34

KDC     7-34

network services     7-35

configuration examples     7-32

configuring     7-35

credentials     7-32

cryptographic software image     7-31

described     7-32

KDC     7-32

operation     7-34

realm     7-33

server     7-33

switch as trusted third party     7-32

terms     7-33

TGT     7-34

tickets     7-32

key distribution center

See Kerberos, KDC

L

l2protocol-tunnel command     13-14

label binding     30-2

label distribution protocol

See LDP

labels, MPLS     30-2

label switching router

See LSR

LACP

See EtherChannel

Layer 2 frames, classification with CoS     26-2

Layer 2 interfaces, default configuration     9-11

Layer 2 protocol tunneling

bypass mode     13-11, 13-13

configuring     13-12

default configuration     13-13

defined     13-11

guidelines     13-13

Layer 2 traceroute

and ARP     34-11

and CDP     34-10

described     34-10

IP addresses and subnets     34-11

MAC addresses and VLANs     34-10

multicast traffic     34-10

multiple devices on a port     34-11

unicast traffic     34-10

usage guidelines     34-10

Layer 2 trunks     10-17

Layer 3 features     1-7

Layer 3 interfaces

assigning IP addresses to     28-5

changing from Layer 2 mode     28-5

types of     28-3

Layer 3 packets, classification methods     26-2

LDAP     4-2

LDP     30-6

leave processing, IGMP     17-10

lightweight directory access protocol

See LDAP

line configuration mode     2-3

Link Aggregation Control Protocol

See EtherChannel

See LACP

links, unidirectional     20-1

link state advertisements (LSAs)     28-32

link-state protocols     28-2

LLQ

described     26-29

enabling     26-97

load balancing, IGRP     28-24

logging messages, ACL     25-9

login authentication

with RADIUS     7-23

with TACACS+     7-14

login banners     5-18

log messages

See system message logging

Long-Reach Ethernet (LRE) technology     1-11

loop guard

described     16-8

enabling     16-15

low-latency queueing

See LLQ

LSR     30-2

M

MAC addresses

aging time     5-22

and VLAN association     5-21

building the address table     5-21

default configuration     5-21

discovering     5-26

displaying     5-25

dynamic

learning     5-21

removing     5-22

in ACLs     25-25

IP address association     28-7

static

adding     5-25

characteristics of     5-24

removing     5-25

MAC address-to-VLAN mapping     10-28

MAC extended access lists

applying to Layer 2 interfaces     25-26

configuring for QoS     26-51

creating     25-25

defined     25-25

for QoS classification     26-6

manageability features     1-3

management options

CLI     2-1

CNS     4-1

SNMP     24-1

mapping tables for QoS

configuring

CoS-to-DSCP     26-59

DSCP     26-59

DSCP-to-CoS     26-62

DSCP-to-DSCP-mutation     26-63

IP-precedence-to-DSCP     26-60

policed-DSCP     26-61

described     26-11

marking

action in

egress policy map     26-81, 26-84

ingress policy map     26-54, 26-57

described

egress     26-5, 26-24

ingress     26-5, 26-10

matching, ACLs     25-6

maximum aging time

MSTP     15-21

STP     14-21

maximum hop count, MSTP     15-21

maximum-paths command     28-50, 28-87

membership mode, VLAN port     10-3

messages

logging ACL violations     25-14

to users through banners     5-18

metrics, in BGP     28-51

metric translations, between routing protocols     28-93

metro tags     13-2

MIBs

accessing files with FTP     A-3

location of files     A-3

overview     24-1

SNMP interaction with     24-4

supported     A-1

mirroring traffic for analysis     21-1

mismatches, autonegotiation     34-7

module number     9-7

monitoring

802.1Q tunneling     13-16

access groups     25-38

ACL configuration     25-38

BGP     28-62

cables for unidirectional links     20-1

CDP     19-5

CEF     28-87

EIGRP     28-42

EoMPLS     30-22

fallback bridging     33-10

features     1-8

HSRP     29-10

IGMP

filters     17-22

snooping     17-10

interfaces     9-20

IP

address tables     28-16

multicast routing     31-49

routes     28-100

IS-IS     28-75

ISO CLNS     28-75

Layer 2 protocol tunneling     13-16

MPLS     30-22

MSDP peers     32-19

multicast router interfaces     17-11

multi-VRF CE     28-86

MVR     17-18

monitoring (continued)

network traffic for analysis with probe     21-2

OSPF     28-36

port

blocking     18-14

protection     18-14

RP mapping information     31-22

source-active messages     32-19

speed and duplex mode     9-14

traffic flowing among switches     22-1

traffic suppression     18-14

tunneling     13-16

VLAN

filters     25-38

maps     25-38

VLANs     10-16

VMPS     10-33

VTP     11-16

MP-BGP     30-12

MPLS

configuring     30-7

default configuration     30-6

experimental field     30-19

label     30-2

monitoring     30-22

QoS

configuring     30-20

default configuration     30-20

experimental bits     30-19

uses     30-18

VPN

labels     30-3

packet flow     30-11

MSDP

benefits of     32-3

clearing MSDP connections and statistics     32-19

MSDP (continued)

controlling source information

forwarded by switch     32-12

originated by switch     32-8

received by switch     32-14

default configuration     32-4

dense-mode regions

sending SA messages to     32-17

specifying the originating address     32-18

filtering

incoming SA messages     32-14

SA messages to a peer     32-12

SA requests from a peer     32-11

join latency, defined     32-6

meshed groups

configuring     32-16

defined     32-16

originating address, changing     32-18

overview     32-1

peer-RPF flooding     32-2

peers

configuring a default     32-4

monitoring     32-19

peering relationship, overview     32-1

requesting source information from     32-8

shutting down     32-16

source-active messages

caching     32-6

clearing cache entries     32-19

defined     32-2

filtering from a peer     32-11

filtering incoming     32-14

filtering to a peer     32-12

limiting data with TTL     32-14

monitoring     32-19

restricting advertised sources     32-9

MSTP

boundary ports

configuration guidelines     15-13

described     15-5

BPDU filtering

described     16-3

enabling     16-12

BPDU guard

described     16-3

enabling     16-11

CIST, described     15-3

configuration guidelines     15-12, 16-9

configuring

forward-delay time     15-20

hello time     15-19

link type for rapid convergence     15-22

maximum aging time     15-21

maximum hop count     15-21

MST region     15-13

path cost     15-18

port priority     15-17

root switch     15-14

secondary root switch     15-16

switch priority     15-19

CST

defined     15-3

operations between regions     15-4

default configuration     15-12

default optional feature configuration     16-9

displaying status     15-23

enabling the mode     15-13

extended system ID

effects on root switch     15-14

effects on secondary root switch     15-16

unexpected behavior     15-15

instances supported     14-10

interface state, blocking to forwarding     16-2

interoperability and compatibility among modes     14-10

MSTP (continued)

interoperability with 802.1D

described     15-5

restarting migration process     15-22

IST

defined     15-3

master     15-3

operations within a region     15-3

loop guard

described     16-8

enabling     16-15

mapping VLANs to MST instance     15-13

MST region

CIST     15-3

configuring     15-13

described     15-2

hop-count mechanism     15-5

IST     15-3

supported spanning-tree instances     15-2

overview     15-2

Port Fast

described     16-2

enabling     16-10

preventing root switch selection     16-7

root guard

described     16-7

enabling     16-14

root switch

configuring     15-15

effects of extended system ID     15-14

unexpected behavior     15-15

shutdown Port Fast-enabled port     16-3

status, displaying     15-23

multicast groups

Immediate Leave     17-5

joining     17-2

leaving     17-4

static joins     17-9

multicast packets

ACLs on     25-37

blocking     18-6

multicast router interfaces, monitoring     17-11

multicast router ports, adding     17-8

Multicast Source Discovery Protocol

See MSDP

multicast storm-control command     18-3

multicast storms     18-1

Multicast VLAN Registration

See MVR

Multiple Spanning Tree Protocol

See MSTP

multiple VPN routing/forwarding, customer edge devices

See multi-VRF CE

multiple VPN routing/forwarding in customer edge devices

See multi-VRF CE

multiprotocol label switching

See MPLS

multi-VRF CE

configuration example     28-82

configuration guidelines     28-79

configuring     28-78

default configuration     28-78

defined     28-76

displaying     28-86

monitoring     28-86

network components     28-78

packet-forwarding process     28-78

MVR

and address aliasing     17-15

configuring interfaces     17-17

default configuration     17-14

described     17-12

modes     17-16

monitoring     17-18

setting global parameters     17-15

N

named IP ACLs     25-13

NameSpace Mapper

See NSM

native VLAN

and 802.1Q tunneling     13-4

configuring     10-24

default     10-24

neighbor discovery/recovery, EIGRP     28-37

neighbors, BGP     28-57

network management

CDP     19-1

RMON     22-1

SNMP     24-1

Network Time Protocol

See NTP

no commands     2-4

non-IP traffic filtering     25-25

nontrunking mode     10-18

normal-range VLANs

configuration modes     10-7

defined     10-1

no switchport command     9-4

note, described     xxxiv

not-so-stubby areas

See NSSA

NSAPs, as ISO IGRP addresses     28-63

NSM     4-3

NSSA, OSPF     28-32

NTP

and ACL time ranges     25-15

associations

authenticating     5-5

defined     5-2

enabling broadcast messages     5-7

peer     5-6

server     5-6

default configuration     5-4

NTP (continued)

displaying the configuration     5-11

overview     5-2

restricting access

creating an access group     5-9

disabling NTP services per interface     5-10

source IP address, configuring     5-10

stratum     5-2

synchronizing devices     5-6

time

services     5-2

synchronizing     5-2

NTP access group keywords, scanning order     5-9

O

Open Shortest Path First

See OSPF

optimizing system resources     6-1

options, management     1-2

OSPF

area parameters, configuring     28-32

configuring     28-30

default configuration

metrics     28-33

route     28-33

settings     28-29

described     28-28

interface parameters, configuring     28-31

LSA group pacing     28-35

monitoring     28-36

router IDs     28-35

route summarization     28-33

virtual links     28-33

P

packet modification, with QoS     26-41

PAgP

See EtherChannel

parallel paths, in routing tables     28-87

passive interfaces

configuring     28-97

OSPF     28-33

passwords

default configuration     7-2

disabling recovery of     7-5

encrypting     7-3

overview     7-1

recovery of     34-3

setting

enable     7-3

enable secret     7-3

Telnet     7-6

with usernames     7-6

VTP domain     11-8

path cost

MSTP     15-18

STP     14-18

PBR

defined     28-94

enabling     28-95

fast-switched policy-based routing     28-96

local policy-based routing     28-96

peers, BGP     28-57

performance features     1-2

per-VLAN spanning-tree plus

See PVST+

PE to CE routing, configuring     28-81

physical ports     9-2

PIM

default configuration     31-8

dense mode

overview     31-4

rendezvous point (RP), described     31-4

RPF lookups     31-7

displaying neighbors     31-50

PIM (continued)

enabling a mode     31-11

overview     31-3

router-query message interval, modifying     31-25

shared tree and source tree, overview     31-22

shortest path tree, delaying the use of     31-24

sparse mode

join messages and shared tree     31-4

overview     31-4

prune messages     31-5

RPF lookups     31-7

versions

interoperability     31-9

troubleshooting interoperability problems     31-22

v2 improvements     31-4

PIM-DVMRP, as snooping method     17-7

ping

character output description     34-9

executing     34-9

overview     34-8

poison-reverse updates, IGRP     28-24

policed-DSCP map for QoS     26-61

policers

configuring

egress, two-rate     26-80

for each matched traffic class     26-54

for more than one traffic class     26-57

displaying aggregate     26-75

egress, two-rate     26-24

ingress, single-rate     26-10

number supported     26-40, 26-77

types of ingress     26-9

policing

egress, described     26-24

ingress, described     26-9

token-bucket algorithm     26-10, 26-24

policy-based routing

See PBR

policy maps for QoS

characteristics of ingress     26-54

described     26-8, 26-23

displaying     26-75, 26-101

port ACLs

defined     25-2

types of     25-3

Port Aggregation Protocol

See EtherChannel

port-based authentication

authentication server

defined     8-2

RADIUS server     8-2

client, defined     8-2

configuration guidelines     8-11

configuring

802.1x authentication     8-11

guest VLAN     8-18

host mode     8-17

manual re-authentication of a client     8-14

periodic re-authentication     8-14

quiet period     8-15

RADIUS server     8-14

RADIUS server parameters on the switch     8-13

switch-to-client frame-retransmission number     8-16

switch-to-client retransmission time     8-15

default configuration     8-10

described     8-1

device roles     8-2

displaying statistics     8-19

EAPOL-start frame     8-3

EAP-request/identity frame     8-3

EAP-response/identity frame     8-3

encapsulation     8-2

guest VLAN

configuration guidelines     8-8

described     8-8

initiation and message exchange     8-3

method lists     8-11

port-based authentication (continued)

multiple-hosts mode, described     8-17

per-user ACLs

AAA authorization     8-11

configuration tasks     8-9

described     8-8

RADIUS server attributes     8-9

ports

authorization state and dot1x port-control command     8-4

authorized and unauthorized     8-4

voice VLAN     8-6

port security

and voice VLAN     8-6

described     8-6

interactions     8-6

multiple-hosts mode     8-17

resetting to default values     8-18

statistics, displaying     8-19

switch

as proxy     8-2

RADIUS client     8-2

topologies, supported     8-5

VLAN assignment

AAA authorization     8-11

characteristics     8-7

configuration tasks     8-8

described     8-7

voice VLAN

described     8-6

PVID     8-6

VVID     8-6

port blocking     18-5

port-channel

See EtherChannel

Port Fast

described     16-2

enabling     16-10

mode, spanning tree     10-29

port membership modes, VLAN     10-3

port priority

MSTP     15-17

STP     14-17

ports

802.1Q tunnel     10-4

access     9-2

blocking     18-5

configuring     9-6

dynamic access     10-4

enhanced services (ES)     9-7

identifying     9-6

numbering     9-7

protected     18-4

routed     9-4

secure     18-6

static-access     10-3, 10-11

switch     9-2

trunks     10-3, 10-16

VLAN assignments     10-11

port security

aging     18-13

and QoS trusted boundary     26-46

configuration guidelines     18-9

configuring     18-10

default configuration     18-9

described     18-6

displaying     18-14

on trunk ports     18-11

sticky learning     18-7

violations     18-8

port-shutdown response, VMPS     10-28

preferential treatment of traffic

See QoS

prefix lists, BGP     28-54

preventing unauthorized access     7-1

priority

HSRP     29-6

overriding CoS     12-5

trusting CoS     12-5

priority queues for QoS

egress LLQ     26-97

ingress     26-68

private VLAN edge ports

See protected ports

privileged EXEC mode     2-2

privilege levels

changing the default for lines     7-9

exiting     7-10

logging into     7-10

overview     7-2, 7-8

setting a command with     7-8

protected ports     18-4

protocol-dependent modules, EIGRP     28-38

Protocol-Independent Multicast Protocol

See PIM

provider edge devices

and MPLS     30-7

and MPLS labels     30-3

in VPNs     30-5

using multi-VRF CE     28-76

proxy ARP

configuring     28-10

definition     28-8

with IP routing disabled     28-10

pruning, VTP

enabling     11-14

enabling on a port     10-23

examples     11-5

overview     11-4

pruning-eligible list

changing     10-23

for VTP pruning     11-4

VLANs     11-14

publications for products, technologies, and network solutions     xxxviii

PVST+

802.1Q trunking interoperability     14-10

described     14-9

instances supported     14-10

Q

QoS

ACLs

IP extended     26-50

IP standard     26-49

MAC     26-51

aggregate policers, configuring     26-57

and 802.1Q tunneling     26-44, 26-77

auto-QoS

categorizing traffic     26-30

configuration and defaults display     26-37

configuration guidelines     26-33

described     26-29

disabling     26-34

effects on running configuration     26-33

egress queue-set defaults     26-30

enabling for VoIP     26-34

example configuration     26-35

generated commands, displaying     26-34

ingress queue defaults     26-30

initial configuration, displaying     26-37

list of generated commands     26-31

basic model     26-4

classification

class maps, described     26-8, 26-23

egress, defined     26-5

flowchart, ingress     26-7

forwarding treatment     26-3

in frames and packets     26-3

ingress, defined     26-4

IP ACLs, described     26-6, 26-8

QoS (continued)

classification (continued)

MAC ACLs, described     26-6, 26-8

options for IP traffic     26-6

options for non-IP traffic     26-6

trust DSCP, described     26-6

trusted CoS, described     26-6

trust IP precedence, described     26-6

class maps

configuring egress     26-78

configuring ingress     26-52

displaying     26-75, 26-101

configuration guidelines

auto-QoS     26-33

hierarchical QoS     26-76

standard QoS     26-40

default configuration

auto-QoS     26-30

hierarchical QoS     26-76

standard QoS     26-38

displaying statistics     26-75

DSCP maps     26-59

egress hierarchical queues

average queue size calculation     26-28

bandwidth limited stream     26-19

CBWFQ     26-28

congestion control     26-27

default queue     26-27

described     26-5, 26-27

LLQ     26-29

number of queues supported     26-27

queue creation     26-23

scheduling     26-5

See also QoS, hierarchical QoS

tail drop     26-27

WRED     26-28

QoS (continued)

egress queue-sets

allocating buffer space     26-69

buffer allocation scheme, described     26-18

characteristics     26-69

configuring shaped weights for SRR     26-72

configuring shared weights for SRR     26-73

described     26-5

displaying the threshold map     26-72

flowchart     26-17

mapping DSCP or CoS values     26-71

scheduling, described     26-5

setting WTD thresholds     26-69

WTD, described     26-19

enabling globally     26-42

flowcharts

egress, two-rate policing and marking     26-24

egress hierarchical queues queueing and scheduling     26-26

egress queue-set queueing and scheduling     26-17

ingress, single-rate policing and marking     26-11

ingress classification     26-7

ingress queueing and scheduling     26-15

hierarchical levels

class level, described     26-20

physical interface level, described     26-22

supported number of class-level classes     26-20

supported number of VLAN-level classes     26-21

VLAN level, described     26-21

hierarchical QoS

CBWFQ     26-28

CBWFQ and DSCP-based WRED     26-89

CBWFQ and IP precedence-based WRED     26-93

CBWFQ and tail drop     26-86

child policy     26-21

classification based on class maps     26-23, 26-78

configuration guidelines     26-76

congestion avoidance     26-27

congestion management     26-27

QoS (continued)

hierarchical QoS (continued)

default class     26-23

default configuration     26-76

displaying     26-101

LLQ     26-29, 26-97

marking     26-24, 26-84

matching criteria     26-23

policing, described     26-24

See also QoS, egress hierarchical queues

See also QoS, hierarchical levels

shaping     26-29, 26-99

tail drop     26-27

traffic policies, described     26-23

two-rate traffic policer     26-24, 26-80

WRED     26-28

implicit deny     26-8

ingress queues

allocating bandwidth     26-67

allocating buffer space     26-66

buffer and bandwidth allocation, described     26-16

characteristics     26-64

configuring shared weights for SRR     26-67

configuring the priority queue     26-68

described     26-5

displaying the threshold map     26-65

flowchart     26-15

mapping DSCP or CoS values     26-65

priority queue, described     26-16

scheduling, described     26-5

setting WTD thresholds     26-65

WTD, described     26-16

in MPLS networks     30-18

IP phones

automatic classification and queueing     26-29

detection and trusted settings     26-29, 26-46

limiting bandwidth on egress interface     26-74

QoS (continued)

mapping tables

CoS-to-DSCP     26-59

displaying     26-75

DSCP-to-CoS     26-62

DSCP-to-DSCP-mutation     26-63

IP-precedence-to-DSCP     26-60

policed-DSCP     26-61

types of     26-11

marked-down actions     26-55, 26-81, 26-84

marking

described, egress     26-5, 26-24

described, ingress     26-5, 26-10

overview     26-2

packet modification     26-41

policers

configuring     26-55, 26-57

displaying aggregate     26-75

egress, two-rate     26-24

ingress, single-rate     26-10

number supported     26-40, 26-77

types of ingress     26-9

policies, attaching to an interface     26-10, 26-25

policing

described     26-4

egress, described     26-24

ingress, described     26-9

token-bucket algorithm     26-10

policy maps

characteristics of ingress     26-54

configuring     26-54

described     26-8, 26-23

displaying     26-75, 26-101

QoS label, defined     26-4

QoS (continued)

queues

configuring egress queue-set characteristics     26-69

configuring ingress characteristics     26-64

location of     26-12

See also QoS, egress hierarchical queues

See also QoS, egress queue-sets

See also QoS, ingress queues

SRR, described     26-14

WTD, described     26-13

rewrites     26-41

trusted boundary, configuring     26-46

trust states

bordering another domain     26-47

described     26-6

trusted device     26-46

within the domain     26-42

QoS features     1-6

quality of service

See QoS

queries, IGMP     17-3

R

RADIUS

attributes

vendor-proprietary     7-30

vendor-specific     7-29

configuring

accounting     7-28

authentication     7-23

authorization     7-27

communication, global     7-21, 7-28

communication, per-server     7-20, 7-21

multiple UDP ports     7-21

default configuration     7-20

defining AAA server groups     7-25

displaying the configuration     7-31

identifying the server     7-20

RADIUS (continued)

limiting the services to the user     7-27

method list, defined     7-20

operation of     7-19

overview     7-18

suggested network environments     7-18

tracking services accessed by user     7-28

range

macro     9-9

of interfaces     9-8

rapid convergence     15-7

rapid per-VLAN spanning-tree plus

See rapid PVST+

rapid PVST+

802.1Q trunking interoperability     14-10

described     14-9

instances supported     14-10

Rapid Spanning Tree Protocol

See RSTP

RARP     28-8

RCP

configuration files

downloading     B-16

overview     B-15

preparing the server     B-16

uploading     B-17

image files

deleting old image     B-31

downloading     B-29

preparing the server     B-28

uploading     B-31

reconfirmation interval, VMPS, changing     10-32

recovery procedures     34-1

redundancy

EtherChannel     27-2

HSRP     29-1

redundancy (continued)

STP

backbone     14-8

path cost     10-26

port priority     10-25

redundant links and UplinkFast     16-13

reliable transport protocol, EIGRP     28-37

reloading software     3-15

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

Remote SPAN

See RSPAN

resets, in BGP     28-49

resetting a UDLD-shutdown interface     20-6

restricting access

NTP services     5-8

overview     7-1

passwords and privilege levels     7-2

RADIUS     7-17

TACACS+     7-10

retry count, VMPS, changing     10-32

reverse address resolution     28-7

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP     28-18

1112, IP multicast and IGMP     17-2

1157, SNMPv1     24-2

1163, BGP     28-43

1166, IP addresses     28-5

1253, OSPF     28-28

1267, BGP     28-43

1305, NTP     5-2

1587, NSSAs     28-28

1757, RMON     22-2

RFC (continued)

1771, BGP     28-43

1901, SNMPv2C     24-2

1902 to 1907, SNMPv2     24-2

2236, IP multicast and IGMP     17-2

2273-2275, SNMPv3     24-2

RIP

advertisements     28-18

authentication     28-21

configuring     28-19

default configuration     28-18

described     28-18

hop counts     28-18

split horizon     28-21

summary addresses     28-21

RMON

default configuration     22-3

displaying status     22-6

enabling alarms and events     22-3

groups supported     22-2

overview     22-1

statistics

collecting group Ethernet     22-6

collecting group history     22-5

root guard

described     16-7

enabling     16-14

root switch

MSTP     15-14

STP     14-14

route calculation timers, OSPF     28-34

route dampening, BGP     28-61

routed packets, ACLs on     25-36

routed ports

configuring     28-3

defined     9-4

IP addresses on     9-18, 28-3

route-map command     28-95

route maps

BGP     28-52

policy-based routing     28-94

router ACLs

defined     25-2

types of     25-3

route reflectors, BGP     28-60

router ID, OSPF     28-35

route selection, BGP     28-50

route summarization, OSPF     28-33

route targets, VPN     28-78

routing

default     28-2

dynamic     28-2

redistribution of information     28-90

static     28-2

routing domain confederation, BGP     28-59

Routing Information Protocol

See RIP

routing protocol administrative distances     28-89

RSPAN

characteristics     21-8

configuration guidelines     21-16

default configuration     21-9

destination ports     21-7

displaying status     21-23

interaction with other features     21-8

monitored ports     21-5

monitoring ports     21-7

overview     21-1

received traffic     21-4

session limits     21-10

sessions

creating     21-17

defined     21-3

limiting source traffic to specific VLANs     21-22

specifying monitored ports     21-17

with ingress traffic enabled     21-20

RSPAN (continued)

source ports     21-5

transmitted traffic     21-5

VLAN-based     21-6

RSTP

active topology, determining     15-6

BPDU

format     15-9

processing     15-10

designated port, defined     15-6

designated switch, defined     15-6

interoperability with 802.1D

described     15-5

restarting migration process     15-22

topology changes     15-10

overview     15-6

port roles

described     15-6

synchronized     15-8

proposal-agreement handshake process     15-7

rapid convergence

described     15-7

edge ports and Port Fast     15-7

point-to-point links     15-7, 15-22

root ports     15-7

root port, defined     15-6

See also MSTP

running configuration, saving     3-10

S

scheduled reloads     3-15

scheduling

egress hierarchical queues

CBWFQ     26-28, 26-86

LLQ     26-29, 26-97

shaping     26-29, 26-99

scheduling (continued)

egress queue-sets

shaped or shared mode     26-19

shaped weights     26-72

shared weights     26-73

WTD thresholds     26-19, 26-69

ingress queues

priority queueing     26-16, 26-68

WTD thresholds     26-16, 26-65

SDM

described     6-1

templates

configuration guidelines     6-3

configuring     6-2, 6-3

number of     6-1

secure MAC addresses

deleting     18-12

maximum number of     18-8

types of     18-7

secure ports, configuring     18-6

secure remote connections     7-37

Secure Shell

See SSH

security, port     18-6

security features     1-5

sequence numbers in log messages     23-7

server mode, VTP     11-3

service-provider network

and 802.1Q tunneling     13-2

and customer VLANs     13-2

and EoMPLS     30-12

and MPLS     30-2

configuring MPLS VPNs     30-6

Layer 2 protocols across     13-11

MSTP and RSTP     15-1

VPNs in     30-3

set-request operation     24-4

setup (CLI) program

described     3-2

See also hardware installation guide

severity levels, defining in system messages     23-8

SFPs

interface numbering     9-6

security and identification     34-8

shaped round robin

See SRR

shaping, average-rate

configuring     26-99

described     26-29

show access-lists hw-summary command     25-19

show and more command output, filtering     2-9

show cdp traffic command     19-5

show configuration command     9-17

show forward command     34-14

show interfaces command     9-14, 9-17

show l2protocol command     13-15

show platform forward command     34-14

show running-config command

displaying ACLs     25-18, 25-38

interface description in     9-17

shutdown command on interfaces     9-22

shutdown threshold for Layer 2 protocol packets     13-13

Simple Network Management Protocol

See SNMP

SNAP     19-1

SNMP

accessing MIB variables with     24-4

agent

described     24-4

disabling     24-7

authentication level     24-9

community strings

configuring     24-7

overview     24-4

configuration examples     24-14

configuration guidelines     24-6

SNMP (continued)

default configuration     24-6

engine ID     24-6

groups     24-6, 24-8

host     24-6

informs

and trap keyword     24-10

described     24-5

differences from traps     24-5

enabling     24-13

limiting access by TFTP servers     24-13

limiting system log messages to NMS     23-9

manager functions     24-3

MIBs

location of     A-3

supported     A-1

notifications     24-5

overview     24-1, 24-4

status, displaying     24-15

system contact and location     24-13

trap manager, configuring     24-12

traps

described     24-3, 24-5

differences from informs     24-5

enabling     24-10

enabling MAC address notification     5-23

overview     24-1, 24-4

types of     24-10

users     24-6, 24-8

versions supported     24-2

SNMPv1     24-2

SNMPv2C     24-2

SNMPv3     24-2

snooping, IGMP     17-2

software images

location in flash memory     B-20

recovery procedures     34-2

scheduling reloads     3-15

tar file format, described     B-20

See also downloading and uploading

source addresses, in ACLs     25-10

source-and-destination-IP address based forwarding, EtherChannel     27-7

source-and-destination MAC address forwarding, EtherChannel     27-7

source-IP address based forwarding, EtherChannel     27-7

source-MAC address forwarding, EtherChannel     27-7

SPAN

configuration guidelines     21-10

default configuration     21-9

destination ports     21-7

displaying status     21-23

interaction with other features     21-8

monitored ports     21-5

monitoring ports     21-7

overview     21-1

received traffic     21-4

session limits     21-10

sessions

configuring ingress forwarding     21-14, 21-21

creating     21-11

defined     21-3

limiting source traffic to specific VLANs     21-15

removing destination (monitoring) ports     21-12

specifying monitored ports     21-11

with ingress traffic enabled     21-13

source ports     21-5

transmitted traffic     21-5

VLAN-based     21-6

spanning tree and native VLANs     10-19

Spanning Tree Protocol

See STP

SPAN traffic     21-4

speed, configuring on interfaces     9-12

split horizon

IGRP     28-27

RIP     28-21

SRR

configuring

shaped weights on egress queue-sets     26-72

shared weights on egress queue-sets     26-73

shared weights on ingress queues     26-67

described     26-14

shaped mode     26-14

shared mode     26-14

SSH

configuring     7-37

cryptographic software image     7-37

described     7-37

displaying settings     7-37

standby ip command     29-5

standby router     29-1

standby timers, HSRP     29-8

startup configuration

booting

manually     3-12

specific image     3-12

clearing     B-18

configuration file

automatically downloading     3-11

specifying the filename     3-11

default boot configuration     3-11

static access ports

assigning to VLAN     10-11

defined     9-3, 10-3

static addresses

See addresses

static routes, configuring     28-88

static routing     28-2

static VLAN membership     10-2

statistics

802.1x     8-19

CDP     19-5

interface     9-21

IP multicast routing     31-50

OSPF     28-36

QoS ingress and egress     26-75

RMON group Ethernet     22-6

RMON group history     22-5

SNMP input and output     24-15

VTP     11-16

sticky secure MAC address learning     18-7

storm control

configuring     18-3

described     18-1

displaying     18-14

thresholds     18-1

STP

802.1D and bridge ID     14-4

802.1D and multicast addresses     14-8

802.1t and VLAN identifier     14-4

accelerating root port selection     16-4

BackboneFast

described     16-5

enabling     16-14

BPDU filtering

described     16-3

enabling     16-12

BPDU guard

described     16-3

enabling     16-11

BPDU message exchange     14-3

configuration guidelines     14-12, 16-9

STP (continued)

configuring

forward-delay time     14-21

hello time     14-20

maximum aging time     14-21

path cost     14-18

port priority     14-17

root switch     14-14

secondary root switch     14-16

spanning-tree mode     14-13

switch priority     14-19

counters, clearing     14-22

default configuration     14-11

default optional feature configuration     16-9

designated port, defined     14-3

designated switch, defined     14-3

detecting indirect link failures     16-6

disabling     14-14

displaying status     14-22

extended system ID

effects on root switch     14-14

effects on the secondary root switch     14-16

overview     14-4

unexpected behavior     14-15

inferior BPDU     14-3

instances supported     14-10

interface state, blocking to forwarding     16-2

interface states

blocking     14-5

disabled     14-7

forwarding     14-5, 14-6

learning     14-6

listening     14-6

overview     14-4

interoperability and compatibility among modes     14-10

Layer 2 protocol tunneling     13-10

limitations with 802.1Q trunks     14-10

STP (continued)

load sharing

overview     10-24

using path costs     10-26

using port priorities     10-25

loop guard

described     16-8

enabling     16-15

modes supported     14-9

multicast addresses, effect of     14-8

overview     14-2

path costs     10-26, 10-27

Port Fast

described     16-2

enabling     16-10

port priorities     10-25

preventing root switch selection     16-7

protocols supported     14-9

redundant connectivity     14-8

root guard

described     16-7

enabling     16-14

root port, defined     14-3

root switch

configuring     14-15

effects of extended system ID     14-4, 14-14

election     14-3

unexpected behavior     14-15

shutdown Port Fast-enabled port     16-3

status, displaying     14-22

superior BPDU     14-3

timers, described     14-20

UplinkFast

described     16-4

enabling     16-13

VLAN-bridge     14-11

stratum, NTP     5-2

stub areas, OSPF     28-32

subnet mask     28-5

subnet zero     28-6

success response, VMPS     10-28

summer time     5-13

SunNet Manager     1-2

supernet     28-6

SVIs

and IP unicast routing     28-3

and router ACLs     25-3

connecting VLANs     9-5

defined     9-4

routing between VLANs     10-2

switch console port     1-3

Switch Database Management

See SDM

switched packets, ACLs on     25-35

Switched Port Analyzer

See SPAN

switched ports     9-2

switchport block multicast command     18-6

switchport block unicast command     18-6

switchport command     9-11

switchport mode dot1q-tunnel command     13-6

switchport protected command     18-5

switch priority

MSTP     15-19

STP     14-19

switch software features     1-1

switch virtual interface

See SVI

synchronization, BGP     28-47

syslog

See system message logging

system clock

configuring

daylight saving time     5-13

manually     5-11

summer time     5-13

time zones     5-12

displaying the time and date     5-12

overview     5-2

See also NTP

system message logging

default configuration     23-3

defining error message severity levels     23-8

disabling     23-4

displaying the configuration     23-12

enabling     23-4

facility keywords, described     23-11

level keywords, described     23-8

limiting messages     23-9

message format     23-2

overview     23-1

sequence numbers, enabling and disabling     23-7

setting the display destination device     23-4

synchronizing log messages     23-5

timestamps, enabling and disabling     23-7

UNIX syslog servers

configuring the daemon     23-10

configuring the logging facility     23-11

facilities supported     23-11

system MTU

and 802.1Q tunneling     13-5

and EoMPLS     30-14

and IS-IS LSPs     28-70

configuring     9-19

maximum size supported     9-19

system name

default configuration     5-15

default setting     5-15

manual configuration     5-15

See also DNS

system prompt

default setting     5-15

manual configuration     5-16

system resources, optimizing     6-1

system routes, IGRP     28-23

system routing

IS-IS     28-63

ISO IGRP     28-63

T

TACACS+

accounting, defined     7-11

authentication, defined     7-11

authorization, defined     7-11

configuring

accounting     7-16

authentication key     7-13

authorization     7-16

login authentication     7-14

default configuration     7-13

displaying the configuration     7-17

identifying the server     7-13

limiting the services to the user     7-16

operation of     7-12

overview     7-10

tracking services accessed by user     7-16

TAC website     xxxvii

tag distribution protocol

See TDP

tagged packets

802.1Q     13-3

Layer 2 protocol     13-10

tail drop

configuring     26-86

described     26-27

tar files

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

TDP     30-6

technical assistance

case priority definitions     xxxvii

opening a case     xxxvii

TAC website     xxxvi

Telnet

accessing management interfaces     2-10

from a browser     2-10

number of connections     1-3

setting a password     7-6

templates, SDM     6-2

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password     7-6

TFTP

configuration files

downloading     B-11

preparing the server     B-10

uploading     B-11

configuration files in base directory     3-6

configuring for autoconfiguration     3-5

image files

deleting     B-23

downloading     B-22

preparing the server     B-21

uploading     B-23

limiting access by servers     24-13

threshold, traffic level     18-2

time

See NTP and system clock

time-range command     25-15

time ranges in ACLs     25-15

timestamps in log messages     23-7

time zones     5-12

Token Ring VLANs

support for     10-6

VTP support     11-4

traceroute, Layer 2

and ARP     34-11

and CDP     34-10

described     34-10

IP addresses and subnets     34-11

MAC addresses and VLANs     34-10

multicast traffic     34-10

multiple devices on a port     34-11

unicast traffic     34-10

usage guidelines     34-10

traceroute command     34-12

See also IP traceroute

traffic

blocking flooded     18-6

fragmented     25-5

unfragmented     25-5

traffic shaping

See shaping, average-rate

traffic suppression     18-1

transparent mode, VTP     11-3, 11-12

trap-door mechanism     3-2

traps

configuring MAC address notification     5-23

configuring managers     24-10

defined     24-3

enabling     5-23, 24-10

notification types     24-10

overview     24-1, 24-4

troubleshooting

connectivity problems     34-8, 34-10, 34-11

detecting unidirectional links     20-1

determining packet forwarding     34-14

displaying crash information     34-17

PIMv1 and PIMv2 interoperability problems     31-22

SFP security and identification     34-8

show forward command     34-14

troubleshooting (continued)

with CiscoWorks     24-4

with debug commands     34-13

with ping     34-8

with system message logging     23-1

with traceroute     34-11

trunk ports

and Layer 2 protocol tunneling     13-12

configuring     10-21

defined     9-3, 10-3

encapsulation     10-21, 10-26, 10-27

secure MAC addresses on     18-10

trunks

allowed-VLAN list     10-22

configuring     10-21, 10-26, 10-27

ISL     10-16

load sharing

setting STP path costs     10-26

using STP port priorities     10-25

native VLAN for untagged traffic     10-24

parallel     10-26

pruning-eligible list     10-23

to non-DTP device     10-17

understanding     10-17

trusted boundary for QoS     26-46

trusted port states

between QoS domains     26-47

classification options     26-6

ensuring port security for IP phones     26-46

within a QoS domain     26-42

tunneling

802.1Q     13-2

defined     13-1

Layer 2 protocol     13-11

tunnel ports

802.1Q, configuring     13-6

defined     10-4

described     9-3, 13-2

incompatibilities with other features     13-6

twisted-pair Ethernet, detecting unidirectional links     20-1

type of service     1-6

U

UDLD

aggressive mode, described     20-1

and autonegotiation     20-1

configuration guidelines     20-4

default configuration     20-4

echoing detection mechanism     20-3

enabling

globally     20-5

per interface     20-5

link-detection mechanism     20-1

modes of operation     20-1

neighbor database     20-2

normal mode, described     20-1

overview     20-1

resetting an interface     20-6

status, displaying     20-6

unidirectional link, defined     20-2

UDP, configuring     28-14

unauthorized ports with 802.1x     8-4

unequal-cost load balancing, IGRP     28-24

unicast storm control command     18-3

unicast storms     18-1

unicast traffic, blocking     18-6

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration     23-10

facilities supported     23-11

message logging configuration     23-11

unrecognized Type-Length-Value (TLV) support     11-4

upgrading software images

See downloading

See release notes     xxxv

UplinkFast

described     16-4

enabling     16-13

uploading

configuration files

preparing     B-10, B-12, B-16

reasons for     B-8

using FTP     B-14

using RCP     B-17

using TFTP     B-11

image files

preparing     B-21, B-24, B-28

reasons for     B-19

using FTP     B-27

using RCP     B-31

using TFTP     B-23

User Datagram Protocol

See UDP

user EXEC mode     2-2

username-based authentication     7-6

V

VCs     30-12

version-dependent transparent mode     11-4

virtual connections

See VCs

Virtual Private Networks

See VPNs

virtual router     29-1, 29-2

vlan.dat file     10-5

VLAN 1, disabling on a trunk port     10-22

VLAN 1 minimization     10-22

VLAN ACLs

See VLAN maps

vlan-assignment response, VMPS     10-28

VLAN configuration

at bootup     10-8

saving     10-8

VLAN configuration mode     2-2, 10-7

VLAN database

and startup configuration file     10-8

and VTP     11-1

VLAN configuration saved in     10-7

VLANs saved in     10-4

vlan database command     10-7

VLAN filtering, and SPAN     21-6

vlan global configuration command     10-7

VLAN ID

customer-side     13-7

discovering     5-26

mapping     13-7

service provider     13-8

VLAN IDs, number supported     1-4

VLAN ID translation

See VLAN mapping

VLAN management domain     11-2

VLAN Management Policy Server

See VMPS

VLAN map entries, order of     25-28

VLAN mapping

802.1Q traffic     13-9

configuring     13-9

described     13-7

VLAN maps

applying     25-31

common uses for     25-31

configuration example     25-32

configuration guidelines     25-28

configuring     25-27

creating     25-28

defined     25-2

denying access example     25-33

denying and permitting packets     25-29

displaying     25-38

examples     25-33

with router ACLs     25-38

VLAN membership

confirming     10-31

modes     10-3

VLAN Query Protocol

See VQP

VLANs

adding to VLAN database     10-9

aging dynamic addresses     14-9

allowed on trunk     10-22

and spanning-tree instances     10-3, 10-6, 10-13

configuration guidelines

extended-range VLANs     10-13

normal-range VLANs     10-6

configuration options     10-7

configuring     10-1

configuring IDs 1006 to 4094     10-13

connecting through SVIs     9-5

creating     10-9

creating in config-vlan mode     10-9

creating in VLAN configuration mode     10-10

customer numbering in service-provider networks     13-3

default configuration     10-8

deleting     10-11

described     9-2, 10-1

displaying     10-16

extended-range     10-1, 10-12

features     1-4

illustrated     10-2

internal     10-13

limiting source traffic

with RSPAN     21-22

with SPAN     21-15

modifying     10-9

native, configuring     10-24

normal-range     10-1, 10-4

number supported     1-4

parameters     10-5

port membership modes     10-3

VLANs (continued)

static-access ports     10-11

STP and 802.1Q trunks     14-10

supported     10-3

Token Ring     10-6

traffic between     10-2

VLAN-bridge STP     14-11, 33-1

VTP modes     11-3

VLAN Trunking Protocol

See VTP

VLAN trunks     10-16, 10-17

VMPS

administering     10-33

configuration example     10-34

configuration guidelines     10-29

default configuration     10-29

description     10-28

dynamic port membership

described     10-29

reconfirming     10-32

troubleshooting     10-33

entering server address     10-30

mapping MAC addresses to VLANs     10-28

monitoring     10-33

reconfirmation interval, changing     10-32

reconfirming membership     10-31

retry count, changing     10-32

voice-over-IP     12-1

voice VLAN

Cisco 7960 phone, port connections     12-1

configuration guidelines     12-3

configuring IP phones for data traffic

override CoS of incoming frame     12-5

trust CoS priority of incoming frame     12-5

configuring ports for voice traffic in

802.1P priority tagged frames     12-5

802.1Q frames     12-4

voice VLAN (continued)

connecting to an IP phone     12-4

default configuration     12-3

described     12-1

displaying     12-6

VPN routing and forwarding table

See VRF

VPNs

and multi-VRF CE     28-80

benefits     30-3

configuring     30-8

configuring routing sessions     28-80

described     30-2

forwarding in     28-78

in service provider networks     28-76

IPv4 prefix     30-5

MPLS     30-6

number supported     30-6

routes     28-76, 30-2, 30-5

VPN services

Layer 2     1-4

Layer 3     1-5

VQP     10-28

VRF

configuration     30-8

defining     28-78

elements     30-3

in MPLS VPNs     30-2

tables     28-76

VTP

adding a client to a domain     11-15

advertisements     10-20, 11-3

and extended-range VLANs     11-1

and normal-range VLANs     11-2

client mode, configuring     11-11

VTP (continued)

configuration

global configuration mode     11-7

guidelines     11-8

privileged EXEC mode     11-7

requirements     11-9

saving     11-7

VLAN configuration mode     11-7

configuration mode options     11-7

configuration requirements     11-9

configuration revision number

guideline     11-15

resetting     11-15

configuring

client mode     11-11

server mode     11-9

transparent mode     11-12

consistency checks     11-4

default configuration     11-6

described     11-1

disabling     11-12

domain names     11-8

domains     11-2

Layer 2 protocol tunneling     13-11

modes

client     11-3, 11-11

server     11-3, 11-9

transitions     11-3

transparent     11-3, 11-12

monitoring     11-16

passwords     11-8

pruning

disabling     11-14

enabling     11-14

examples     11-5

overview     11-4

pruning-eligible list, changing     10-23

server mode, configuring     11-9

statistics     11-16

VTP (continued)

Token Ring support     11-4

transparent mode, configuring     11-12

using     11-1

version, guidelines     11-8

version 1     11-4

version 2

configuration guidelines     11-8

disabling     11-13

enabling     11-13

overview     11-4

W

Weighted Random Early Detection

See WRED

weighted tail drop

See WTD

WRED

configuring DSCP-based     26-89

configuring IP precedence-based     26-93

described     26-28

WTD

described     26-13

setting thresholds

egress queue-sets     26-69

ingress queues     26-65

X

XMODEM protocol     34-2