Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -
Index
Numerics
802.1D
See STP
802.1p 12-1
802.1Q
and trunk ports 9-3
configuration limitations 10-19
encapsulation 10-16
native VLAN for untagged traffic 10-24
tunneling
compatibility with other features 13-6
defaults 13-4
described 13-2
tunnel ports with other features 13-6
802.1s
See MSTP
802.1w
See RSTP
802.1x
See port-based authentication
802.3ad
See EtherChannel
802.3z flow control 9-15
A
abbreviating commands 2-4
ABRs 28-28
access-class command 25-17
access control entries
See ACEs
access-denied response, VMPS 10-28
access groups
applying ACLs to interfaces 25-18
IP 25-19
Layer 2 25-18
Layer 3 25-19
access lists
See ACLs
access ports
and Layer 2 protocol tunneling 13-12
defined 9-2
accounting
with RADIUS 7-28
with TACACS+ 7-11, 7-16
ACEs
and QoS 26-8
defined 25-2
Ethernet 25-2
IP 25-2
ACLs
ACEs 25-2
any keyword 25-11
applying
on bridged packets 25-36
on multicast packets 25-37
on routed packets 25-36
on switched packets 25-35
time ranges to 25-15
to an interface 25-18
to QoS 26-8
classifying traffic for QoS 26-49
comments in 25-17
compiling 25-20
configuring with VLAN maps 25-34
ACLs (continued)
defined 25-1, 25-6
examples of 25-20, 26-49
extended IP
configuring for QoS classification 26-50
creating 25-9
matching criteria 25-6
hardware and software handling 25-19
host keyword 25-11
IP
applying to interfaces 25-18
creating 25-6
fragments and QoS guidelines 26-40
implicit deny 25-8, 25-12, 25-14
implicit masks 25-8
matching criteria 25-6
named 25-13
terminal lines, setting on 25-17
undefined 25-19
violations, logging 25-14
limiting actions 25-35
logging messages 25-9
log keyword 25-14
MAC extended 25-25, 26-51
matching 25-6, 25-19
monitoring 25-38
named 25-13
number per QoS class map 26-40
numbers 25-7
port 25-2
precedence of 25-2
QoS 26-8, 26-49
router 25-2
standard IP
configuring for QoS classification 26-49
creating 25-8
matching criteria 25-6
supported features 25-19
time ranges 25-15
ACLs (continued)
unsupported features 25-6
using router ACLs with VLAN maps 25-34
VLAN maps
configuration guidelines 25-28
configuring 25-27
active router 29-1
address aliasing 17-2
addresses
displaying the MAC address table 5-25
dynamic
accelerated aging 14-8
changing the aging time 5-22
default aging 14-8
defined 5-20
learning 5-21
removing 5-22
MAC, discovering 5-26
multicast
group address range 31-3
STP address management 14-8
static
adding and removing 5-24
defined 5-20
address resolution 5-26, 28-7
Address Resolution Protocol
See ARP
adjacency tables, with CEF 28-87
administrative distances
defined 28-98
OSPF 28-33
routing protocol defaults 28-89
advertisements
CDP 19-1
IGRP 28-23
RIP 28-18
VTP 10-20, 11-3
aggregate addresses, BGP 28-58
aggregated ports
See EtherChannel
aggregate policers 26-57
aging, accelerating 14-8
aging time
accelerated
for MSTP 15-20
for STP 14-8, 14-21
MAC address table 5-22
maximum
for MSTP 15-21
for STP 14-21
alarms, RMON 22-3
allowed-VLAN list 10-22
alternate routes, IGRP 28-24
Any Transport over MPLS
See AToM
area border routers
See ABRs
area routing
IS-IS 28-63
ISO IGRP 28-63
ARP
configuring 28-8
defined 5-26, 28-8
encapsulation 28-9
static cache configuration 28-8
ARP table
address resolution 5-26
managing 5-26
ASBRs 28-28
AS-path filters, BGP 28-53
asymmetrical links, and 802.1Q tunneling 13-4
AToM 30-12
attributes, RADIUS
vendor-proprietary 7-30
vendor-specific 7-29
audience xxxiii
authentication
EIGRP 28-41
HSRP 29-8
Kerberos 7-31
local mode with AAA 7-36
NTP associations 5-5
RADIUS
key 7-21
login 7-23
See also port-based authentication
TACACS+
defined 7-11
key 7-13
login 7-14
authentication keys, and routing protocols 28-99
authoritative time source, described 5-2
authorization
with RADIUS 7-27
with TACACS+ 7-11, 7-16
authorized ports with 802.1x 8-4
autoconfiguration 3-3
automatic QoS
See QoS
autonegotiation
interface configuration guidelines 9-13
mismatches 34-7
autonomous system boundary routers
See ASBRs
autonomous systems, in BGP 28-47
Auto-RP, described 31-5
auxiliary VLAN
See voice VLAN
availability features 1-3
B
BackboneFast
described 16-5
enabling 16-14
banners
configuring
login 5-20
message-of-the-day login 5-19
default configuration 5-18
when displayed 5-18
BGP
aggregate addresses 28-58
aggregate routes, configuring 28-58
CIDR 28-58
clear commands 28-62
community filtering 28-55
configuring neighbors 28-57
configuring routing sessions 30-9
default configuration 28-45
described 28-44
enabling 28-47
monitoring 28-62
multipath support 28-50
neighbors, types of 28-47
path selection 28-50
peers, configuring 28-57
prefix filtering 28-54
resetting sessions 28-49
route dampening 28-61
route maps 28-52
route reflectors 28-60
routing domain confederation 28-59
routing session with multi-VRF CE 28-81
show commands 28-62
supernets 28-58
Version 4 28-44
blocking packets 18-5
booting
boot loader, function of 3-2
boot process 3-1
manually 3-12
specific image 3-12
boot loader
accessing 3-13
described 3-2
environment variables 3-13
prompt 3-13
trap-door mechanism 3-2
bootstrap router (BSR), described 31-5
Border Gateway Protocol
See BGP
BPDU
error-disabled state 16-3
filtering 16-3
RSTP format 15-9
BPDU filtering
described 16-3
enabling 16-12
BPDU guard
described 16-3
enabling 16-11
bridged packets, ACLs on 25-36
bridge groups
See fallback bridging
bridge protocol data unit
See BPDU
broadcast flooding 28-15
broadcast packets
directed 28-12
flooded 28-12
broadcast storm-control command 18-3
broadcast storms 18-1, 28-12
bypass mode, Layer 2 protocol-tunneling 13-11, 13-13
C
cables, monitoring for unidirectional links 20-1
caution, described xxxiv
CBWFQ
configuring
with DSCP-based WRED 26-89
with IP precedence-based WRED 26-93
with tail drop 26-86
described 26-28
CDP
and trusted boundary 26-46
configuring 19-2
default configuration 19-2
described 19-1
disabling for routing device 19-3, 19-4
enabling and disabling
on an interface 19-4
on a switch 19-3
Layer 2 protocol tunneling 13-10
monitoring 19-5
overview 19-1
transmission timer and holdtime, setting 19-2
updates 19-2
CEF 28-86
CGMP
as IGMP snooping learning method 17-7
clearing cached group entries 31-49
enabling server support 31-32
joining multicast group 17-2
overview 31-7
server support only 31-7
CIDR 28-58
Cisco 7960 IP Phone 12-1
Cisco Discovery Protocol
See CDP
Cisco Express Forwarding
See CEF
Cisco Group Management Protocol
See CGMP
Cisco Intelligence Engine 2100 Series Configuration Registrar
See IE2100
Cisco IOS File System 1-3
Cisco Networking Services
See IE2100
CiscoWorks 2000 1-2, 24-4
class-based weighted fair queueing
See CBWFQ
classless interdomain routing
See CIDR
classless routing 28-6
class maps for QoS
configuring
egress 26-78
ingress 26-52
described 26-8, 26-23
displaying 26-75, 26-101
class of service
See CoS
clearing interfaces 9-21
CLI
abbreviating commands 2-4
command modes 2-1
editing features
enabling and disabling 2-7
keystroke editing 2-7
wrapped lines 2-8
error messages 2-5
filtering command output 2-9
getting help 2-3
history
changing the buffer size 2-5
described 2-5
disabling 2-6
recalling commands 2-6
no and default forms of commands 2-4
client mode, VTP 11-3
CLNS
See ISO CLNS
clock
See system clock
command-line interface
See CLI
command modes 2-1
commands
abbreviating 2-4
no and default 2-4
setting privilege levels 7-8
community list, BGP 28-56
community strings
configuring 24-7
overview 24-4
config.text 3-11
configuration, initial
Express Setup 1-8
See also hardware installation guide
setup (CLI) program 1-8
configuration examples
ACLs and VLAN maps 25-29
IP ACLs 25-20
multi-VRF-CE 28-82
network 1-11
SNMP 24-14
VLAN maps 25-31
VMPS 10-29
configuration files
clearing the startup configuration B-18
creating using a text editor B-9
default name 3-11
deleting a stored configuration B-19
described B-8
downloading
automatically 3-11
preparing B-10, B-12, B-16
reasons for B-8
using FTP B-13
using RCP B-16
using TFTP B-11
guidelines for creating and using B-8
invalid combinations when copying B-5
configuration files (continued)
limiting TFTP server access 24-13
obtaining with DHCP 3-7
password recovery disable considerations 7-5
specifying the filename 3-11
system contact and location information 24-13
types and location B-9
uploading
preparing B-10, B-12, B-16
reasons for B-8
using FTP B-14
using RCP B-17
using TFTP B-11
configuration guidelines
802.1Q trunks 10-19
applying ACLs 25-18
applying MAC ACLs 25-26
auto-QoS 26-33
Auto-RP and BSR 31-9
EtherChannel 27-9
fallback bridging 33-3
hierarchical QoS 26-76
HSRP
authentication and timers 29-8
interfaces 29-4
priority 29-6
interface speed and duplex mode 9-13
IP multicast routing 31-8
MSTP 15-12, 16-9
multi-VRF CE 28-79
named ACLs 25-13
port-based authentication 8-11
port security 18-9
protected ports 18-5
router ACLs and VLAN maps 25-34
RSPAN 21-16
SDM templates 6-3
SNMP 24-6
SPAN 21-10
configuration guidelines (continued)
standard QoS 26-40
STP 14-12, 16-9
UDLD 20-4
VLAN maps 25-28
VLANs
extended-range 10-13
normal-range 10-6
VMPS 10-29
voice VLAN 12-3
VTP 11-8
configuration settings, saving 3-10
configure terminal command 9-7
config-vlan mode 2-2, 10-7
congestion-avoidance mechanisms
WRED 26-27, 26-89, 26-93
WTD 26-13, 26-65, 26-69
congestion management for QoS 26-27
connectionless service, and VPNs 30-3
connections, secure remote 7-37
connectivity problems 34-8, 34-10, 34-11
consistency checks in VTP version 2 11-4
console port, connecting to 2-10
conventions
command xxxiv
for examples xxxiv
publication xxxiv
text xxxiv
corrupted software, recovery steps with XMODEM 34-2
CoS
configuring the default port value 26-45
in Layer 2 frames 26-2
override priority 12-5
trust priority 12-5
CoS input queue threshold map for QoS 26-16
CoS output queue threshold map for QoS 26-19
CoS-to-DSCP map for QoS 26-59
counters, clearing interface 9-21
crashinfo file 34-17
cryptographic software image
Kerberos 7-31
SSH 7-37
customer edge devices
and Multi-VFR CE 28-76
and VPNs 30-3, 30-5
D
daylight saving time 5-13
debugging
enabling all system diagnostics 34-14
enabling for a specific feature 34-13
redirecting error message output 34-14
using commands 34-13
default commands 2-4
default configuration
802.1Q tunneling 13-4
802.1x 8-10
auto-QoS 26-30
banners 5-18
BGP 28-45
booting 3-11
CDP 19-2
DNS 5-17
EIGRP 28-38
EoMPLS 30-15
EtherChannel 27-9
fallback bridging 33-3
hierarchical QoS 26-76
HSRP 29-4
IGMP 31-26
IGMP filtering 17-19
IGMP snooping 17-5
IGRP 28-24
initial switch information 3-3
IP addressing, IP routing 28-4
IP multicast routing 31-8
IS-IS 28-67
default configuration (continued)
ISO IGRP 28-64
Layer 2 interfaces 9-11
Layer 2 protocol tunneling 13-13
MAC address table 5-21
MPLS 30-6
MPLS QoS 30-20
MSDP 32-4
MSTP 15-12
multi-VRF CE 28-78
MVR 17-14
NTP 5-4
optional spanning-tree features 16-9
OSPF 28-29
password and privilege level 7-2
RADIUS 7-20
RIP 28-18
RMON 22-3
RSPAN 21-9
SNMP 24-6
SPAN 21-9
standard QoS 26-38
STP 14-11
system message logging 23-3
system name and prompt 5-15
TACACS+ 7-13
UDLD 20-4
VLAN, Layer 2 Ethernet interfaces 10-19
VLAN mapping 13-8
VLANs 10-8
VMPS 10-29
voice VLAN 12-3
VTP 11-6
default gateway 3-10, 28-10
default networks 28-89
default routes 28-89
default routing 28-2
deleting VLANs 10-11
description command 9-17
designing your network, examples 1-11
destination addresses, in ACLs 25-10
destination-IP address based forwarding, EtherChannel 27-7
destination-MAC address forwarding, EtherChannel 27-7
detecting indirect link failures, STP 16-6
device discovery protocol 19-1
DHCP-based autoconfiguration
client request message exchange 3-4
configuring
client side 3-3
DNS 3-6
relay device 3-6
server-side 3-5
TFTP server 3-5
example 3-8
lease options
for IP address information 3-5
for receiving the configuration file 3-5
overview 3-3
relationship to BOOTP 3-3
Differentiated Services architecture, QoS 26-2
Differentiated Services Code Point
See DSCP
Diffusing Update Algorithm (DUAL) 28-37
directories
changing B-3
creating and removing B-4
displaying the working B-3
Distance Vector Multicast Routing Protocol
See DVMRP
distance-vector protocols 28-2
distribute-list command 28-97
DNS
and DHCP-based autoconfiguration 3-6
default configuration 5-17
displaying the configuration 5-18
overview 5-16
setting up 5-17
documentation
feedback xxxvi
obtaining, world wide web xxxv
ordering xxxvi
related xxxv
document conventions xxxiv
domain names
DNS 5-16
VTP 11-8
Domain Name System
See DNS
domains, ISO IGRP routing 28-63
dot1q-tunnel switchport mode 10-18
double-tagged packets
802.1Q tunneling 13-2
Layer 2 protocol tunneling 13-12
downloading
configuration files
preparing B-10, B-12, B-16
reasons for B-8
using FTP B-13
using RCP B-16
using TFTP B-11
image files
deleting old image B-23
preparing B-21, B-24, B-28
reasons for B-19
using FTP B-25
using RCP B-29
using TFTP B-22
drop threshold for Layer 2 protocol packets 13-13
DSCP 26-2
DSCP input queue threshold map for QoS 26-16
DSCP output queue threshold map for QoS 26-19
DSCP-to-CoS map for QoS 26-62
DSCP-to-DSCP-mutation map for QoS 26-63
DTP 10-17
DUAL finite state machine, EIGRP 28-37
duplex mode, configuring 9-12
DVMRP
autosummarization
configuring a summary address 31-46
disabling 31-48
connecting PIM domain to DVMRP router 31-38
enabling unicast routing 31-42
interoperability
with Cisco devices 31-36
with IOS software 31-7
mrinfo requests, responding to 31-41
neighbors
advertising the default route to 31-40
discovery with Probe messages 31-36
displaying information 31-41
prevent peering with nonpruning 31-44
rejecting nonpruning 31-43
overview 31-7
routes
adding a metric offset 31-48
advertising all 31-48
advertising the default route to neighbors 31-40
caching DVMRP routes learned in report messages 31-42
changing the threshold for syslog messages 31-45
deleting 31-49
displaying 31-50
favoring one over another 31-48
limiting the number injected into MBONE 31-45
limiting unicast route advertisements 31-36
routing table 31-7
source distribution tree, building 31-7
tunnels
configuring 31-38
displaying neighbor information 31-41
dynamic access ports
characteristics 10-4
configuring 10-31
defined 9-3
dynamic addresses
See addresses
dynamic auto trunking mode 10-18
dynamic desirable trunking mode 10-18
Dynamic Host Configuration Protocol
See DHCP-based autoconfiguration
dynamic port VLAN membership
described 10-29
reconfirming 10-31, 10-32
troubleshooting 10-33
types of connections 10-31
dynamic routing
ISO CLNS 28-63
protocols 28-2
Dynamic Trunking Protocol
See DTP
E
EBGP 28-43, 30-5
editing features
enabling and disabling 2-7
keystrokes used 2-7
wrapped lines 2-8
EIGRP
and IGRP 28-39
authentication 28-41
components 28-37
configuring 28-39
default configuration 28-38
definition 28-37
interface parameters, configuring 28-40
monitoring 28-42
enable password 7-3
enable secret password 7-3
encryption for passwords 7-3
Enhanced IGRP
See EIGRP
enhanced-services interfaces
See ES interfaces
environment variables, function of 3-14
EoMPLS
and 802.1Q tunneling 30-13
and Layer 2 protocol tunneling 30-14
and QoS 30-14
configuring 30-16
default configuration 30-15
limitations 30-14
monitoring 30-22
packet flow 30-17
QoS 30-18
equal-cost routing 28-87
error messages during command entry 2-5
ES interfaces 9-7, 30-1
EtherChannel
802.3ad, described 27-5
automatic creation of 27-4, 27-5
channel groups
binding physical and logical interfaces 27-3
numbering of 27-3
configuration guidelines 27-9
configuring
Layer 3 physical interfaces 27-13
Layer 3 port-channel logical interfaces 27-12
configuring Layer 2 interfaces 27-10
default configuration 27-9
described 27-2
displaying status 27-19
forwarding methods 27-6, 27-15
interaction
with STP 27-9
with VLANs 27-10
EtherChannel (continued)
LACP
described 27-5
displaying status 27-19
hot-standby ports 27-17
interaction with other features 27-6
modes 27-6
port priority 27-18
system priority 27-18
Layer 3 interface 28-3
load balancing 27-6, 27-15
logical interfaces, described 27-3
number of interfaces per 27-2
PAgP
aggregate-port learners 27-16
compatibility with Catalyst 1900 27-16
described 27-4
displaying status 27-19
interaction with other features 27-5
learn method and priority configuration 27-16
modes 27-4
silent mode 27-5
port-channel interfaces
described 27-3
numbering of 27-3
port groups 9-5
Ethernet over MPLS
See EoMPLS
Ethernet VLANs
creating 10-9
defaults and ranges 10-8
modifying 10-9
events, RMON 22-3
examples
conventions for xxxiv
network configuration 1-11
experimental bits, setting MPLS priority with 30-20
Express Setup
See hardware installation guide
extended-range VLANs
configuration guidelines 10-13
configuring 10-12
creating 10-13, 10-14
defined 10-1
extended system ID
MSTP 15-14
STP 14-4, 14-14
Extensible Authentication Protocol over LAN 8-1
exterior routes, IGRP 28-23
external BGP
See EBGP
external neighbors, BGP 28-47
F
fallback bridging
and protected ports 33-3
bridge groups
creating 33-3
described 33-1
displaying 33-10
function of 33-2
number supported 33-4
removing 33-4
bridge table
clearing 33-10
displaying 33-10
configuration guidelines 33-3
connecting interfaces with 9-6
default configuration 33-3
described 33-1
frame forwarding
flooding packets 33-2
forwarding packets 33-2
overview 33-1
fallback bridging (continued)
STP
disabling on an interface 33-10
forward-delay interval 33-9
hello BPDU interval 33-8
interface priority 33-6
maximum-idle interval 33-9
path cost 33-7
VLAN-bridge spanning-tree priority 33-5
VLAN-bridge STP 33-2
SVIs and routed ports 33-1
VLAN-bridge STP 14-11, 33-1
features
availability 1-3
Layer 2 VPN services 1-4
Layer 3 1-7
Layer 3 VPN services 1-5
manageability 1-3
management options 1-2
monitoring 1-8
performance 1-2
QoS 1-6
security 1-5
VLAN 1-4
feedback to Cisco Systems, web xxxvi
FIB 28-86
fiber-optic, detecting unidirectional links 20-1
files
copying B-4
crashinfo
description 34-17
displaying the contents of 34-17
location 34-17
deleting B-5
displaying the contents of B-7
files (continued)
tar
creating B-6
displaying the contents of B-6
extracting B-7
image file format B-20
file system
displaying available file systems B-2
displaying file information B-3
local file system names B-1
network file system names B-4
setting the default B-3
filtering
in a VLAN 25-27
non-IP traffic 25-25
show and more command output 2-9
filters, IP
See ACLs, IP
flash device, number of B-1
flash updates, IGRP 28-24
flooded traffic, blocking 18-6
flowcharts
QoS egress, two-rate policing and marking 26-24
QoS egress hierarchical queues queueing and scheduling 26-26
QoS egress queue-set queueing and scheduling 26-17
QoS ingress, single-rate policing and marking 26-11
QoS ingress classification 26-7
QoS ingress queueing and scheduling 26-15
flow control 9-15
forward-delay time
MSTP 15-20
STP 14-21
forwarding equivalence classes 30-2
Forwarding Information Base
See FIB
forwarding non-routable protocols 33-1
FTP
accessing MIB files A-3
configuration files
downloading B-13
overview B-12
preparing the server B-12
uploading B-14
image files
deleting old image B-27
downloading B-25
preparing the server B-24
uploading B-27
G
get-bulk-request operation 24-3
get-next-request operation 24-3, 24-4
get-request operation 24-3, 24-4
get-response operation 24-3
global configuration mode 2-2
guest VLAN and 802.1x 8-8
guide
audience xxxiii
purpose of xxxiii
H
hardware limitations and Layer 3 interfaces 9-18
hello time
MSTP 15-19
STP 14-20
help, for the command line 2-3
hierarchical QoS
See QoS
history
changing the buffer size 2-5
described 2-5
disabling 2-6
recalling commands 2-6
history table, level and number of syslog messages 23-9
hosts, limit on dynamic ports 10-33
Hot Standby Router Protocol
See HSRP
HP OpenView 1-2
HSRP
authentication string 29-8
configuring 29-3
default configuration 29-4
definition 29-1
enabling 29-5
guidelines 29-4
monitoring 29-10
overview 29-1
priority 29-6
timers 29-8
tracking 29-6
I
IBGP 28-43, 30-5
ICMP
redirect messages 28-10
time exceeded messages 34-12
traceroute and 34-12
unreachable messages 25-18
unreachables and ACLs 25-19
ICMP ping
executing 34-9
overview 34-8
ICMP Router Discovery Protocol
See IRDP
IDS appliances
and ingress RSPAN 21-20
and ingress SPAN 21-13
IE2100
CNS embedded agents
described 4-5
enabling automated configuration 4-6
enabling configuration agent 4-9
enabling event agent 4-8
Configuration Registrar
configID, deviceID, hostname 4-3
configuration service 4-2
described 4-1
event service 4-3
IGMP
configuring the switch
as a member of a group 31-26
statically connected member 31-31
controlling access to groups 31-27
default configuration 31-26
deleting cache entries 31-50
displaying groups 31-50
fast switching 31-31
host-query interval, modifying 31-29
joining multicast group 17-2
join messages 17-2
leave processing, enabling 17-10
leaving multicast group 17-4
multicast reachability 31-26
overview 31-2
queries 17-3
Version 1
changing to Version 2 31-28
described 31-3
IGMP (continued)
Version 2
changing to Version 1 31-28
described 31-3
maximum query response time value 31-30
pruning groups 31-30
query timeout value 31-30
IGMP filtering
configuring 17-19
default configuration 17-19
described 17-19
monitoring 17-22
IGMP groups, setting the maximum number 17-21
IGMP profile
applying 17-20
configuration mode 17-19
configuring 17-20
IGMP snooping
and address aliasing 17-2
configuring 17-5
default configuration 17-5
definition 17-2
enabling and disabling 17-6
global configuration 17-6
Immediate Leave 17-5
method 17-6
monitoring 17-10
VLAN configuration 17-6
IGP 28-28
IGRP
advertisements 28-23
alternate routes 28-24
configuring 28-25
default configuration 28-24
described 28-23
exterior routes 28-23
flash updates 28-24
interior routes 28-23
load balancing 28-24
IGRP (continued)
poison-reverse updates 28-24
split horizon 28-27
system routes 28-23
traffic sharing 28-25
unequal-cost load balancing 28-24
Immediate-Leave, IGMP 17-5
initial configuration
defaults 1-8
Express Setup 1-8
See also hardware installation guide
setup (CLI) program 1-8
Intelligence Engine 2100 Series CNS Agents
See IE2100
interdomain routing, ISO IGRP 28-63
interface
number 9-7
range macros 9-9
interface command 9-6, 9-7
interface configuration mode 2-3
interfaces
configuration guidelines 9-13
configuring 9-7
configuring duplex mode 9-12
configuring speed 9-12
counters, clearing 9-21
described 9-17
descriptive name, adding 9-17
displaying information about 9-20
flow control 9-15
management 1-2
monitoring 9-20
naming 9-17
physical, identifying 9-6
range of 9-8
restarting 9-22
shutting down 9-22
supported 9-6
types of 9-1
interfaces range macro command 9-9
interface types 9-6
Interior Gateway Protocol
See IGP
Interior Gateway Routing Protocol
See IGRP
interior routes, IGRP 28-23
Intermediate-System-to-Intermediate-System protocol
See IS-IS
internal BGP
See IBGP
internal neighbors, BGP 28-47
Internet Control Message Protocol
See ICMP
Internet Group Management Protocol
See IGMP
Inter-Switch Link
See ISL
inter-VLAN routing 28-2
Intrusion Detection System
See IDS appliances
ip access group command 25-19
IP ACLs
extended, creating 25-9
for QoS classification 26-8
implicit deny 25-8, 25-12, 25-14
implicit masks 25-8
logging 25-14
named 25-13
standard, creating 25-8
undefined 25-19
virtual terminal lines, setting on 25-17
IP addresses
classes of 28-5
default configuration 28-4
discovering 5-26
for IP routing 28-4
MAC address association 28-7
monitoring 28-16
IP broadcast address 28-15
ip cef command 28-87
IP directed broadcasts 28-13
ip igmp profile command 17-19
IP information
assigned
manually 3-9
through DHCP-based autoconfiguration 3-3
default configuration 3-3
IP multicast routing
addresses
all-hosts 31-3
all-multicast-routers 31-3
host group address range 31-3
administratively-scoped boundaries, described 31-34
and IGMP snooping 17-2
Auto-RP
adding to an existing sparse-mode cloud 31-14
benefits of 31-13
clearing the cache 31-50
configuration guidelines 31-9
filtering incoming RP announcement messages 31-16
overview 31-5
preventing candidate RP spoofing 31-16
preventing join messages to false RPs 31-15
setting up in a new internetwork 31-13
using with BSR 31-21
bootstrap router
configuration guidelines 31-9
configuring candidate BSRs 31-19
configuring candidate RPs 31-20
defining the IP multicast boundary 31-18
defining the PIM domain border 31-17
overview 31-5
using with Auto-RP 31-21
Cisco implementation 31-2
configuring
basic multicast routing 31-10
IP multicast boundary 31-34
IP multicast routing (continued)
default configuration 31-8
enabling
multicast forwarding 31-10
PIM mode 31-11
group-to-RP mappings
Auto-RP 31-5
BSR 31-5
MBONE
deleting sdr cache entries 31-50
described 31-33
displaying sdr cache 31-51
enabling sdr listener support 31-33
limiting DVMRP routes advertised 31-45
limiting sdr cache entry lifetime 31-34
SAP packets for conference session announcement 31-33
Session Directory (sdr) tool, described 31-33
monitoring
packet rate loss 31-51
peering devices 31-51
tracing a path 31-51
multicast forwarding, described 31-6
PIMv1 and PIMv2 interoperability 31-9
protocol interaction 31-2
reverse path check (RPF) 31-6
routing table
deleting 31-50
displaying 31-50
RP
assigning manually 31-12
configuring Auto-RP 31-13
configuring PIMv2 BSR 31-17
monitoring mapping information 31-22
using Auto-RP and BSR 31-21
statistics, displaying system and network 31-50
See also CGMP
See also DVMRP
IP multicast routing (continued)
See also IGMP
See also PIM
IP phones
and QoS 12-1
automatic classification and queueing 26-29
configuring 12-4
ensuring port security with QoS 26-46
trusted boundary for QoS 26-46
IP precedence 26-2
IP-precedence-to-DSCP map for QoS 26-60
IP protocols in ACLs 25-10
IP routes, monitoring 28-100
IP routing
connecting interfaces with 9-6
enabling 28-17
IP traceroute
executing 34-12
overview 34-11
IP unicast routing
address resolution 28-7
administrative distances 28-89, 28-98
ARP 28-8
assigning IP addresses to Layer 3 interfaces 28-5
authentication keys 28-99
broadcast
address 28-15
flooding 28-15
packets 28-12
storms 28-12
classless routing 28-6
configuring static routes 28-88
default
addressing configuration 28-4
gateways 28-10
networks 28-89
routes 28-89
routing 28-2
IP unicast routing (continued)
directed broadcasts 28-13
dynamic routing protocols 28-2
enabling 28-17
EtherChannel Layer 3 interface 28-3
IGP 28-28
inter-VLAN 28-2
IP addressing
classes 28-5
configuring 28-4
IRDP 28-11
Layer 3 interfaces 28-3
MAC address and IP address 28-7
passive interfaces 28-97
protocols
distance-vector 28-2
dynamic 28-2
link-state 28-2
proxy ARP 28-8
redistribution 28-90
reverse address resolution 28-7
routed ports 28-3
static routing 28-2
steps to configure 28-3
subnet mask 28-5
subnet zero 28-6
supernet 28-6
UDP 28-14
with SVIs 28-3
See also BGP
See also EIGRP
See also IGRP
See also IS-IS
See also OSPF
See also RIP
IRDP
configuring 28-11
definition 28-11
IS-IS
addresses 28-63
area routing 28-63
default configuration 28-67
monitoring 28-75
show commands 28-75
system routing 28-63
ISL
and trunk ports 9-3
encapsulation 10-16
trunking with 802.1 tunneling 13-5
ISO CLNS
clear commands 28-75
dynamic routing protocols 28-63
monitoring 28-75
NETs 28-63
NSAPs 28-63
OSI standard 28-63
ISO IGRP
area routing 28-63
configuring 28-64
default configuration 28-64
interdomain routing 28-63
optional parameters 28-66
routing processes 28-64
system routing 28-63
J
join messages, IGMP 17-2
K
Kerberos
authenticating to
boundary switch 7-34
KDC 7-34
network services 7-35
configuration examples 7-32
configuring 7-35
credentials 7-32
cryptographic software image 7-31
described 7-32
KDC 7-32
operation 7-34
realm 7-33
server 7-33
switch as trusted third party 7-32
terms 7-33
TGT 7-34
tickets 7-32
key distribution center
See Kerberos, KDC
L
l2protocol-tunnel command 13-14
label binding 30-2
label distribution protocol
See LDP
labels, MPLS 30-2
label switching router
See LSR
LACP
See EtherChannel
Layer 2 frames, classification with CoS 26-2
Layer 2 interfaces, default configuration 9-11
Layer 2 protocol tunneling
bypass mode 13-11, 13-13
configuring 13-12
default configuration 13-13
defined 13-11
guidelines 13-13
Layer 2 traceroute
and ARP 34-11
and CDP 34-10
described 34-10
IP addresses and subnets 34-11
MAC addresses and VLANs 34-10
multicast traffic 34-10
multiple devices on a port 34-11
unicast traffic 34-10
usage guidelines 34-10
Layer 2 trunks 10-17
Layer 3 features 1-7
Layer 3 interfaces
assigning IP addresses to 28-5
changing from Layer 2 mode 28-5
types of 28-3
Layer 3 packets, classification methods 26-2
LDAP 4-2
LDP 30-6
leave processing, IGMP 17-10
lightweight directory access protocol
See LDAP
line configuration mode 2-3
Link Aggregation Control Protocol
See EtherChannel
See LACP
links, unidirectional 20-1
link state advertisements (LSAs) 28-32
link-state protocols 28-2
LLQ
described 26-29
enabling 26-97
load balancing, IGRP 28-24
logging messages, ACL 25-9
login authentication
with RADIUS 7-23
with TACACS+ 7-14
login banners 5-18
log messages
See system message logging
Long-Reach Ethernet (LRE) technology 1-11
loop guard
described 16-8
enabling 16-15
low-latency queueing
See LLQ
LSR 30-2
M
MAC addresses
aging time 5-22
and VLAN association 5-21
building the address table 5-21
default configuration 5-21
discovering 5-26
displaying 5-25
dynamic
learning 5-21
removing 5-22
in ACLs 25-25
IP address association 28-7
static
adding 5-25
characteristics of 5-24
removing 5-25
MAC address-to-VLAN mapping 10-28
MAC extended access lists
applying to Layer 2 interfaces 25-26
configuring for QoS 26-51
creating 25-25
defined 25-25
for QoS classification 26-6
manageability features 1-3
management options
CLI 2-1
CNS 4-1
SNMP 24-1
mapping tables for QoS
configuring
CoS-to-DSCP 26-59
DSCP 26-59
DSCP-to-CoS 26-62
DSCP-to-DSCP-mutation 26-63
IP-precedence-to-DSCP 26-60
policed-DSCP 26-61
described 26-11
marking
action in
egress policy map 26-81, 26-84
ingress policy map 26-54, 26-57
described
egress 26-5, 26-24
ingress 26-5, 26-10
matching, ACLs 25-6
maximum aging time
MSTP 15-21
STP 14-21
maximum hop count, MSTP 15-21
maximum-paths command 28-50, 28-87
membership mode, VLAN port 10-3
messages
logging ACL violations 25-14
to users through banners 5-18
metrics, in BGP 28-51
metric translations, between routing protocols 28-93
metro tags 13-2
MIBs
accessing files with FTP A-3
location of files A-3
overview 24-1
SNMP interaction with 24-4
supported A-1
mirroring traffic for analysis 21-1
mismatches, autonegotiation 34-7
module number 9-7
monitoring
802.1Q tunneling 13-16
access groups 25-38
ACL configuration 25-38
BGP 28-62
cables for unidirectional links 20-1
CDP 19-5
CEF 28-87
EIGRP 28-42
EoMPLS 30-22
fallback bridging 33-10
features 1-8
HSRP 29-10
IGMP
filters 17-22
snooping 17-10
interfaces 9-20
IP
address tables 28-16
multicast routing 31-49
routes 28-100
IS-IS 28-75
ISO CLNS 28-75
Layer 2 protocol tunneling 13-16
MPLS 30-22
MSDP peers 32-19
multicast router interfaces 17-11
multi-VRF CE 28-86
MVR 17-18
monitoring (continued)
network traffic for analysis with probe 21-2
OSPF 28-36
port
blocking 18-14
protection 18-14
RP mapping information 31-22
source-active messages 32-19
speed and duplex mode 9-14
traffic flowing among switches 22-1
traffic suppression 18-14
tunneling 13-16
VLAN
filters 25-38
maps 25-38
VLANs 10-16
VMPS 10-33
VTP 11-16
MP-BGP 30-12
MPLS
configuring 30-7
default configuration 30-6
experimental field 30-19
label 30-2
monitoring 30-22
QoS
configuring 30-20
default configuration 30-20
experimental bits 30-19
uses 30-18
VPN
labels 30-3
packet flow 30-11
MSDP
benefits of 32-3
clearing MSDP connections and statistics 32-19
MSDP (continued)
controlling source information
forwarded by switch 32-12
originated by switch 32-8
received by switch 32-14
default configuration 32-4
dense-mode regions
sending SA messages to 32-17
specifying the originating address 32-18
filtering
incoming SA messages 32-14
SA messages to a peer 32-12
SA requests from a peer 32-11
join latency, defined 32-6
meshed groups
configuring 32-16
defined 32-16
originating address, changing 32-18
overview 32-1
peer-RPF flooding 32-2
peers
configuring a default 32-4
monitoring 32-19
peering relationship, overview 32-1
requesting source information from 32-8
shutting down 32-16
source-active messages
caching 32-6
clearing cache entries 32-19
defined 32-2
filtering from a peer 32-11
filtering incoming 32-14
filtering to a peer 32-12
limiting data with TTL 32-14
monitoring 32-19
restricting advertised sources 32-9
MSTP
boundary ports
configuration guidelines 15-13
described 15-5
BPDU filtering
described 16-3
enabling 16-12
BPDU guard
described 16-3
enabling 16-11
CIST, described 15-3
configuration guidelines 15-12, 16-9
configuring
forward-delay time 15-20
hello time 15-19
link type for rapid convergence 15-22
maximum aging time 15-21
maximum hop count 15-21
MST region 15-13
path cost 15-18
port priority 15-17
root switch 15-14
secondary root switch 15-16
switch priority 15-19
CST
defined 15-3
operations between regions 15-4
default configuration 15-12
default optional feature configuration 16-9
displaying status 15-23
enabling the mode 15-13
extended system ID
effects on root switch 15-14
effects on secondary root switch 15-16
unexpected behavior 15-15
instances supported 14-10
interface state, blocking to forwarding 16-2
interoperability and compatibility among modes 14-10
MSTP (continued)
interoperability with 802.1D
described 15-5
restarting migration process 15-22
IST
defined 15-3
master 15-3
operations within a region 15-3
loop guard
described 16-8
enabling 16-15
mapping VLANs to MST instance 15-13
MST region
CIST 15-3
configuring 15-13
described 15-2
hop-count mechanism 15-5
IST 15-3
supported spanning-tree instances 15-2
overview 15-2
Port Fast
described 16-2
enabling 16-10
preventing root switch selection 16-7
root guard
described 16-7
enabling 16-14
root switch
configuring 15-15
effects of extended system ID 15-14
unexpected behavior 15-15
shutdown Port Fast-enabled port 16-3
status, displaying 15-23
multicast groups
Immediate Leave 17-5
joining 17-2
leaving 17-4
static joins 17-9
multicast packets
ACLs on 25-37
blocking 18-6
multicast router interfaces, monitoring 17-11
multicast router ports, adding 17-8
Multicast Source Discovery Protocol
See MSDP
multicast storm-control command 18-3
multicast storms 18-1
Multicast VLAN Registration
See MVR
Multiple Spanning Tree Protocol
See MSTP
multiple VPN routing/forwarding, customer edge devices
See multi-VRF CE
multiple VPN routing/forwarding in customer edge devices
See multi-VRF CE
multiprotocol label switching
See MPLS
multi-VRF CE
configuration example 28-82
configuration guidelines 28-79
configuring 28-78
default configuration 28-78
defined 28-76
displaying 28-86
monitoring 28-86
network components 28-78
packet-forwarding process 28-78
MVR
and address aliasing 17-15
configuring interfaces 17-17
default configuration 17-14
described 17-12
modes 17-16
monitoring 17-18
setting global parameters 17-15
N
named IP ACLs 25-13
NameSpace Mapper
See NSM
native VLAN
and 802.1Q tunneling 13-4
configuring 10-24
default 10-24
neighbor discovery/recovery, EIGRP 28-37
neighbors, BGP 28-57
network management
CDP 19-1
RMON 22-1
SNMP 24-1
Network Time Protocol
See NTP
no commands 2-4
non-IP traffic filtering 25-25
nontrunking mode 10-18
normal-range VLANs
configuration modes 10-7
defined 10-1
no switchport command 9-4
note, described xxxiv
not-so-stubby areas
See NSSA
NSAPs, as ISO IGRP addresses 28-63
NSM 4-3
NSSA, OSPF 28-32
NTP
and ACL time ranges 25-15
associations
authenticating 5-5
defined 5-2
enabling broadcast messages 5-7
peer 5-6
server 5-6
default configuration 5-4
NTP (continued)
displaying the configuration 5-11
overview 5-2
restricting access
creating an access group 5-9
disabling NTP services per interface 5-10
source IP address, configuring 5-10
stratum 5-2
synchronizing devices 5-6
time
services 5-2
synchronizing 5-2
NTP access group keywords, scanning order 5-9
O
Open Shortest Path First
See OSPF
optimizing system resources 6-1
options, management 1-2
OSPF
area parameters, configuring 28-32
configuring 28-30
default configuration
metrics 28-33
route 28-33
settings 28-29
described 28-28
interface parameters, configuring 28-31
LSA group pacing 28-35
monitoring 28-36
router IDs 28-35
route summarization 28-33
virtual links 28-33
P
packet modification, with QoS 26-41
PAgP
See EtherChannel
parallel paths, in routing tables 28-87
passive interfaces
configuring 28-97
OSPF 28-33
passwords
default configuration 7-2
disabling recovery of 7-5
encrypting 7-3
overview 7-1
recovery of 34-3
setting
enable 7-3
enable secret 7-3
Telnet 7-6
with usernames 7-6
VTP domain 11-8
path cost
MSTP 15-18
STP 14-18
PBR
defined 28-94
enabling 28-95
fast-switched policy-based routing 28-96
local policy-based routing 28-96
peers, BGP 28-57
performance features 1-2
per-VLAN spanning-tree plus
See PVST+
PE to CE routing, configuring 28-81
physical ports 9-2
PIM
default configuration 31-8
dense mode
overview 31-4
rendezvous point (RP), described 31-4
RPF lookups 31-7
displaying neighbors 31-50
PIM (continued)
enabling a mode 31-11
overview 31-3
router-query message interval, modifying 31-25
shared tree and source tree, overview 31-22
shortest path tree, delaying the use of 31-24
sparse mode
join messages and shared tree 31-4
overview 31-4
prune messages 31-5
RPF lookups 31-7
versions
interoperability 31-9
troubleshooting interoperability problems 31-22
v2 improvements 31-4
PIM-DVMRP, as snooping method 17-7
ping
character output description 34-9
executing 34-9
overview 34-8
poison-reverse updates, IGRP 28-24
policed-DSCP map for QoS 26-61
policers
configuring
egress, two-rate 26-80
for each matched traffic class 26-54
for more than one traffic class 26-57
displaying aggregate 26-75
egress, two-rate 26-24
ingress, single-rate 26-10
number supported 26-40, 26-77
types of ingress 26-9
policing
egress, described 26-24
ingress, described 26-9
token-bucket algorithm 26-10, 26-24
policy-based routing
See PBR
policy maps for QoS
characteristics of ingress 26-54
described 26-8, 26-23
displaying 26-75, 26-101
port ACLs
defined 25-2
types of 25-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
authentication server
defined 8-2
RADIUS server 8-2
client, defined 8-2
configuration guidelines 8-11
configuring
802.1x authentication 8-11
guest VLAN 8-18
host mode 8-17
manual re-authentication of a client 8-14
periodic re-authentication 8-14
quiet period 8-15
RADIUS server 8-14
RADIUS server parameters on the switch 8-13
switch-to-client frame-retransmission number 8-16
switch-to-client retransmission time 8-15
default configuration 8-10
described 8-1
device roles 8-2
displaying statistics 8-19
EAPOL-start frame 8-3
EAP-request/identity frame 8-3
EAP-response/identity frame 8-3
encapsulation 8-2
guest VLAN
configuration guidelines 8-8
described 8-8
initiation and message exchange 8-3
method lists 8-11
port-based authentication (continued)
multiple-hosts mode, described 8-17
per-user ACLs
AAA authorization 8-11
configuration tasks 8-9
described 8-8
RADIUS server attributes 8-9
ports
authorization state and dot1x port-control command 8-4
authorized and unauthorized 8-4
voice VLAN 8-6
port security
and voice VLAN 8-6
described 8-6
interactions 8-6
multiple-hosts mode 8-17
resetting to default values 8-18
statistics, displaying 8-19
switch
as proxy 8-2
RADIUS client 8-2
topologies, supported 8-5
VLAN assignment
AAA authorization 8-11
characteristics 8-7
configuration tasks 8-8
described 8-7
voice VLAN
described 8-6
PVID 8-6
VVID 8-6
port blocking 18-5
port-channel
See EtherChannel
Port Fast
described 16-2
enabling 16-10
mode, spanning tree 10-29
port membership modes, VLAN 10-3
port priority
MSTP 15-17
STP 14-17
ports
802.1Q tunnel 10-4
access 9-2
blocking 18-5
configuring 9-6
dynamic access 10-4
enhanced services (ES) 9-7
identifying 9-6
numbering 9-7
protected 18-4
routed 9-4
secure 18-6
static-access 10-3, 10-11
switch 9-2
trunks 10-3, 10-16
VLAN assignments 10-11
port security
aging 18-13
and QoS trusted boundary 26-46
configuration guidelines 18-9
configuring 18-10
default configuration 18-9
described 18-6
displaying 18-14
on trunk ports 18-11
sticky learning 18-7
violations 18-8
port-shutdown response, VMPS 10-28
preferential treatment of traffic
See QoS
prefix lists, BGP 28-54
preventing unauthorized access 7-1
priority
HSRP 29-6
overriding CoS 12-5
trusting CoS 12-5
priority queues for QoS
egress LLQ 26-97
ingress 26-68
private VLAN edge ports
See protected ports
privileged EXEC mode 2-2
privilege levels
changing the default for lines 7-9
exiting 7-10
logging into 7-10
overview 7-2, 7-8
setting a command with 7-8
protected ports 18-4
protocol-dependent modules, EIGRP 28-38
Protocol-Independent Multicast Protocol
See PIM
provider edge devices
and MPLS 30-7
and MPLS labels 30-3
in VPNs 30-5
using multi-VRF CE 28-76
proxy ARP
configuring 28-10
definition 28-8
with IP routing disabled 28-10
pruning, VTP
enabling 11-14
enabling on a port 10-23
examples 11-5
overview 11-4
pruning-eligible list
changing 10-23
for VTP pruning 11-4
VLANs 11-14
publications for products, technologies, and network solutions xxxviii
PVST+
802.1Q trunking interoperability 14-10
described 14-9
instances supported 14-10
Q
QoS
ACLs
IP extended 26-50
IP standard 26-49
MAC 26-51
aggregate policers, configuring 26-57
and 802.1Q tunneling 26-44, 26-77
auto-QoS
categorizing traffic 26-30
configuration and defaults display 26-37
configuration guidelines 26-33
described 26-29
disabling 26-34
effects on running configuration 26-33
egress queue-set defaults 26-30
enabling for VoIP 26-34
example configuration 26-35
generated commands, displaying 26-34
ingress queue defaults 26-30
initial configuration, displaying 26-37
list of generated commands 26-31
basic model 26-4
classification
class maps, described 26-8, 26-23
egress, defined 26-5
flowchart, ingress 26-7
forwarding treatment 26-3
in frames and packets 26-3
ingress, defined 26-4
IP ACLs, described 26-6, 26-8
QoS (continued)
classification (continued)
MAC ACLs, described 26-6, 26-8
options for IP traffic 26-6
options for non-IP traffic 26-6
trust DSCP, described 26-6
trusted CoS, described 26-6
trust IP precedence, described 26-6
class maps
configuring egress 26-78
configuring ingress 26-52
displaying 26-75, 26-101
configuration guidelines
auto-QoS 26-33
hierarchical QoS 26-76
standard QoS 26-40
default configuration
auto-QoS 26-30
hierarchical QoS 26-76
standard QoS 26-38
displaying statistics 26-75
DSCP maps 26-59
egress hierarchical queues
average queue size calculation 26-28
bandwidth limited stream 26-19
CBWFQ 26-28
congestion control 26-27
default queue 26-27
described 26-5, 26-27
LLQ 26-29
number of queues supported 26-27
queue creation 26-23
scheduling 26-5
See also QoS, hierarchical QoS
tail drop 26-27
WRED 26-28
QoS (continued)
egress queue-sets
allocating buffer space 26-69
buffer allocation scheme, described 26-18
characteristics 26-69
configuring shaped weights for SRR 26-72
configuring shared weights for SRR 26-73
described 26-5
displaying the threshold map 26-72
flowchart 26-17
mapping DSCP or CoS values 26-71
scheduling, described 26-5
setting WTD thresholds 26-69
WTD, described 26-19
enabling globally 26-42
flowcharts
egress, two-rate policing and marking 26-24
egress hierarchical queues queueing and scheduling 26-26
egress queue-set queueing and scheduling 26-17
ingress, single-rate policing and marking 26-11
ingress classification 26-7
ingress queueing and scheduling 26-15
hierarchical levels
class level, described 26-20
physical interface level, described 26-22
supported number of class-level classes 26-20
supported number of VLAN-level classes 26-21
VLAN level, described 26-21
hierarchical QoS
CBWFQ 26-28
CBWFQ and DSCP-based WRED 26-89
CBWFQ and IP precedence-based WRED 26-93
CBWFQ and tail drop 26-86
child policy 26-21
classification based on class maps 26-23, 26-78
configuration guidelines 26-76
congestion avoidance 26-27
congestion management 26-27
QoS (continued)
hierarchical QoS (continued)
default class 26-23
default configuration 26-76
displaying 26-101
LLQ 26-29, 26-97
marking 26-24, 26-84
matching criteria 26-23
policing, described 26-24
See also QoS, egress hierarchical queues
See also QoS, hierarchical levels
shaping 26-29, 26-99
tail drop 26-27
traffic policies, described 26-23
two-rate traffic policer 26-24, 26-80
WRED 26-28
implicit deny 26-8
ingress queues
allocating bandwidth 26-67
allocating buffer space 26-66
buffer and bandwidth allocation, described 26-16
characteristics 26-64
configuring shared weights for SRR 26-67
configuring the priority queue 26-68
described 26-5
displaying the threshold map 26-65
flowchart 26-15
mapping DSCP or CoS values 26-65
priority queue, described 26-16
scheduling, described 26-5
setting WTD thresholds 26-65
WTD, described 26-16
in MPLS networks 30-18
IP phones
automatic classification and queueing 26-29
detection and trusted settings 26-29, 26-46
limiting bandwidth on egress interface 26-74
QoS (continued)
mapping tables
CoS-to-DSCP 26-59
displaying 26-75
DSCP-to-CoS 26-62
DSCP-to-DSCP-mutation 26-63
IP-precedence-to-DSCP 26-60
policed-DSCP 26-61
types of 26-11
marked-down actions 26-55, 26-81, 26-84
marking
described, egress 26-5, 26-24
described, ingress 26-5, 26-10
overview 26-2
packet modification 26-41
policers
configuring 26-55, 26-57
displaying aggregate 26-75
egress, two-rate 26-24
ingress, single-rate 26-10
number supported 26-40, 26-77
types of ingress 26-9
policies, attaching to an interface 26-10, 26-25
policing
described 26-4
egress, described 26-24
ingress, described 26-9
token-bucket algorithm 26-10
policy maps
characteristics of ingress 26-54
configuring 26-54
described 26-8, 26-23
displaying 26-75, 26-101
QoS label, defined 26-4
QoS (continued)
queues
configuring egress queue-set characteristics 26-69
configuring ingress characteristics 26-64
location of 26-12
See also QoS, egress hierarchical queues
See also QoS, egress queue-sets
See also QoS, ingress queues
SRR, described 26-14
WTD, described 26-13
rewrites 26-41
trusted boundary, configuring 26-46
trust states
bordering another domain 26-47
described 26-6
trusted device 26-46
within the domain 26-42
QoS features 1-6
quality of service
See QoS
queries, IGMP 17-3
R
RADIUS
attributes
vendor-proprietary 7-30
vendor-specific 7-29
configuring
accounting 7-28
authentication 7-23
authorization 7-27
communication, global 7-21, 7-28
communication, per-server 7-20, 7-21
multiple UDP ports 7-21
default configuration 7-20
defining AAA server groups 7-25
displaying the configuration 7-31
identifying the server 7-20
RADIUS (continued)
limiting the services to the user 7-27
method list, defined 7-20
operation of 7-19
overview 7-18
suggested network environments 7-18
tracking services accessed by user 7-28
range
macro 9-9
of interfaces 9-8
rapid convergence 15-7
rapid per-VLAN spanning-tree plus
See rapid PVST+
rapid PVST+
802.1Q trunking interoperability 14-10
described 14-9
instances supported 14-10
Rapid Spanning Tree Protocol
See RSTP
RARP 28-8
RCP
configuration files
downloading B-16
overview B-15
preparing the server B-16
uploading B-17
image files
deleting old image B-31
downloading B-29
preparing the server B-28
uploading B-31
reconfirmation interval, VMPS, changing 10-32
recovery procedures 34-1
redundancy
EtherChannel 27-2
HSRP 29-1
redundancy (continued)
STP
backbone 14-8
path cost 10-26
port priority 10-25
redundant links and UplinkFast 16-13
reliable transport protocol, EIGRP 28-37
reloading software 3-15
Remote Authentication Dial-In User Service
See RADIUS
Remote Copy Protocol
See RCP
Remote Network Monitoring
See RMON
Remote SPAN
See RSPAN
resets, in BGP 28-49
resetting a UDLD-shutdown interface 20-6
restricting access
NTP services 5-8
overview 7-1
passwords and privilege levels 7-2
RADIUS 7-17
TACACS+ 7-10
retry count, VMPS, changing 10-32
reverse address resolution 28-7
Reverse Address Resolution Protocol
See RARP
RFC
1058, RIP 28-18
1112, IP multicast and IGMP 17-2
1157, SNMPv1 24-2
1163, BGP 28-43
1166, IP addresses 28-5
1253, OSPF 28-28
1267, BGP 28-43
1305, NTP 5-2
1587, NSSAs 28-28
1757, RMON 22-2
RFC (continued)
1771, BGP 28-43
1901, SNMPv2C 24-2
1902 to 1907, SNMPv2 24-2
2236, IP multicast and IGMP 17-2
2273-2275, SNMPv3 24-2
RIP
advertisements 28-18
authentication 28-21
configuring 28-19
default configuration 28-18
described 28-18
hop counts 28-18
split horizon 28-21
summary addresses 28-21
RMON
default configuration 22-3
displaying status 22-6
enabling alarms and events 22-3
groups supported 22-2
overview 22-1
statistics
collecting group Ethernet 22-6
collecting group history 22-5
root guard
described 16-7
enabling 16-14
root switch
MSTP 15-14
STP 14-14
route calculation timers, OSPF 28-34
route dampening, BGP 28-61
routed packets, ACLs on 25-36
routed ports
configuring 28-3
defined 9-4
IP addresses on 9-18, 28-3
route-map command 28-95
route maps
BGP 28-52
policy-based routing 28-94
router ACLs
defined 25-2
types of 25-3
route reflectors, BGP 28-60
router ID, OSPF 28-35
route selection, BGP 28-50
route summarization, OSPF 28-33
route targets, VPN 28-78
routing
default 28-2
dynamic 28-2
redistribution of information 28-90
static 28-2
routing domain confederation, BGP 28-59
Routing Information Protocol
See RIP
routing protocol administrative distances 28-89
RSPAN
characteristics 21-8
configuration guidelines 21-16
default configuration 21-9
destination ports 21-7
displaying status 21-23
interaction with other features 21-8
monitored ports 21-5
monitoring ports 21-7
overview 21-1
received traffic 21-4
session limits 21-10
sessions
creating 21-17
defined 21-3
limiting source traffic to specific VLANs 21-22
specifying monitored ports 21-17
with ingress traffic enabled 21-20
RSPAN (continued)
source ports 21-5
transmitted traffic 21-5
VLAN-based 21-6
RSTP
active topology, determining 15-6
BPDU
format 15-9
processing 15-10
designated port, defined 15-6
designated switch, defined 15-6
interoperability with 802.1D
described 15-5
restarting migration process 15-22
topology changes 15-10
overview 15-6
port roles
described 15-6
synchronized 15-8
proposal-agreement handshake process 15-7
rapid convergence
described 15-7
edge ports and Port Fast 15-7
point-to-point links 15-7, 15-22
root ports 15-7
root port, defined 15-6
See also MSTP
running configuration, saving 3-10
S
scheduled reloads 3-15
scheduling
egress hierarchical queues
CBWFQ 26-28, 26-86
LLQ 26-29, 26-97
shaping 26-29, 26-99
scheduling (continued)
egress queue-sets
shaped or shared mode 26-19
shaped weights 26-72
shared weights 26-73
WTD thresholds 26-19, 26-69
ingress queues
priority queueing 26-16, 26-68
WTD thresholds 26-16, 26-65
SDM
described 6-1
templates
configuration guidelines 6-3
configuring 6-2, 6-3
number of 6-1
secure MAC addresses
deleting 18-12
maximum number of 18-8
types of 18-7
secure ports, configuring 18-6
secure remote connections 7-37
Secure Shell
See SSH
security, port 18-6
security features 1-5
sequence numbers in log messages 23-7
server mode, VTP 11-3
service-provider network
and 802.1Q tunneling 13-2
and customer VLANs 13-2
and EoMPLS 30-12
and MPLS 30-2
configuring MPLS VPNs 30-6
Layer 2 protocols across 13-11
MSTP and RSTP 15-1
VPNs in 30-3
set-request operation 24-4
setup (CLI) program
described 3-2
See also hardware installation guide
severity levels, defining in system messages 23-8
SFPs
interface numbering 9-6
security and identification 34-8
shaped round robin
See SRR
shaping, average-rate
configuring 26-99
described 26-29
show access-lists hw-summary command 25-19
show and more command output, filtering 2-9
show cdp traffic command 19-5
show configuration command 9-17
show forward command 34-14
show interfaces command 9-14, 9-17
show l2protocol command 13-15
show platform forward command 34-14
show running-config command
displaying ACLs 25-18, 25-38
interface description in 9-17
shutdown command on interfaces 9-22
shutdown threshold for Layer 2 protocol packets 13-13
Simple Network Management Protocol
See SNMP
SNAP 19-1
SNMP
accessing MIB variables with 24-4
agent
described 24-4
disabling 24-7
authentication level 24-9
community strings
configuring 24-7
overview 24-4
configuration examples 24-14
configuration guidelines 24-6
SNMP (continued)
default configuration 24-6
engine ID 24-6
groups 24-6, 24-8
host 24-6
informs
and trap keyword 24-10
described 24-5
differences from traps 24-5
enabling 24-13
limiting access by TFTP servers 24-13
limiting system log messages to NMS 23-9
manager functions 24-3
MIBs
location of A-3
supported A-1
notifications 24-5
overview 24-1, 24-4
status, displaying 24-15
system contact and location 24-13
trap manager, configuring 24-12
traps
described 24-3, 24-5
differences from informs 24-5
enabling 24-10
enabling MAC address notification 5-23
overview 24-1, 24-4
types of 24-10
users 24-6, 24-8
versions supported 24-2
SNMPv1 24-2
SNMPv2C 24-2
SNMPv3 24-2
snooping, IGMP 17-2
software images
location in flash memory B-20
recovery procedures 34-2
scheduling reloads 3-15
tar file format, described B-20
See also downloading and uploading
source addresses, in ACLs 25-10
source-and-destination-IP address based forwarding, EtherChannel 27-7
source-and-destination MAC address forwarding, EtherChannel 27-7
source-IP address based forwarding, EtherChannel 27-7
source-MAC address forwarding, EtherChannel 27-7
SPAN
configuration guidelines 21-10
default configuration 21-9
destination ports 21-7
displaying status 21-23
interaction with other features 21-8
monitored ports 21-5
monitoring ports 21-7
overview 21-1
received traffic 21-4
session limits 21-10
sessions
configuring ingress forwarding 21-14, 21-21
creating 21-11
defined 21-3
limiting source traffic to specific VLANs 21-15
removing destination (monitoring) ports 21-12
specifying monitored ports 21-11
with ingress traffic enabled 21-13
source ports 21-5
transmitted traffic 21-5
VLAN-based 21-6
spanning tree and native VLANs 10-19
Spanning Tree Protocol
See STP
SPAN traffic 21-4
speed, configuring on interfaces 9-12
split horizon
IGRP 28-27
RIP 28-21
SRR
configuring
shaped weights on egress queue-sets 26-72
shared weights on egress queue-sets 26-73
shared weights on ingress queues 26-67
described 26-14
shaped mode 26-14
shared mode 26-14
SSH
configuring 7-37
cryptographic software image 7-37
described 7-37
displaying settings 7-37
standby ip command 29-5
standby router 29-1
standby timers, HSRP 29-8
startup configuration
booting
manually 3-12
specific image 3-12
clearing B-18
configuration file
automatically downloading 3-11
specifying the filename 3-11
default boot configuration 3-11
static access ports
assigning to VLAN 10-11
defined 9-3, 10-3
static addresses
See addresses
static routes, configuring 28-88
static routing 28-2
static VLAN membership 10-2
statistics
802.1x 8-19
CDP 19-5
interface 9-21
IP multicast routing 31-50
OSPF 28-36
QoS ingress and egress 26-75
RMON group Ethernet 22-6
RMON group history 22-5
SNMP input and output 24-15
VTP 11-16
sticky secure MAC address learning 18-7
storm control
configuring 18-3
described 18-1
displaying 18-14
thresholds 18-1
STP
802.1D and bridge ID 14-4
802.1D and multicast addresses 14-8
802.1t and VLAN identifier 14-4
accelerating root port selection 16-4
BackboneFast
described 16-5
enabling 16-14
BPDU filtering
described 16-3
enabling 16-12
BPDU guard
described 16-3
enabling 16-11
BPDU message exchange 14-3
configuration guidelines 14-12, 16-9
STP (continued)
configuring
forward-delay time 14-21
hello time 14-20
maximum aging time 14-21
path cost 14-18
port priority 14-17
root switch 14-14
secondary root switch 14-16
spanning-tree mode 14-13
switch priority 14-19
counters, clearing 14-22
default configuration 14-11
default optional feature configuration 16-9
designated port, defined 14-3
designated switch, defined 14-3
detecting indirect link failures 16-6
disabling 14-14
displaying status 14-22
extended system ID
effects on root switch 14-14
effects on the secondary root switch 14-16
overview 14-4
unexpected behavior 14-15
inferior BPDU 14-3
instances supported 14-10
interface state, blocking to forwarding 16-2
interface states
blocking 14-5
disabled 14-7
forwarding 14-5, 14-6
learning 14-6
listening 14-6
overview 14-4
interoperability and compatibility among modes 14-10
Layer 2 protocol tunneling 13-10
limitations with 802.1Q trunks 14-10
STP (continued)
load sharing
overview 10-24
using path costs 10-26
using port priorities 10-25
loop guard
described 16-8
enabling 16-15
modes supported 14-9
multicast addresses, effect of 14-8
overview 14-2
path costs 10-26, 10-27
Port Fast
described 16-2
enabling 16-10
port priorities 10-25
preventing root switch selection 16-7
protocols supported 14-9
redundant connectivity 14-8
root guard
described 16-7
enabling 16-14
root port, defined 14-3
root switch
configuring 14-15
effects of extended system ID 14-4, 14-14
election 14-3
unexpected behavior 14-15
shutdown Port Fast-enabled port 16-3
status, displaying 14-22
superior BPDU 14-3
timers, described 14-20
UplinkFast
described 16-4
enabling 16-13
VLAN-bridge 14-11
stratum, NTP 5-2
stub areas, OSPF 28-32
subnet mask 28-5
subnet zero 28-6
success response, VMPS 10-28
summer time 5-13
SunNet Manager 1-2
supernet 28-6
SVIs
and IP unicast routing 28-3
and router ACLs 25-3
connecting VLANs 9-5
defined 9-4
routing between VLANs 10-2
switch console port 1-3
Switch Database Management
See SDM
switched packets, ACLs on 25-35
Switched Port Analyzer
See SPAN
switched ports 9-2
switchport block multicast command 18-6
switchport block unicast command 18-6
switchport command 9-11
switchport mode dot1q-tunnel command 13-6
switchport protected command 18-5
switch priority
MSTP 15-19
STP 14-19
switch software features 1-1
switch virtual interface
See SVI
synchronization, BGP 28-47
syslog
See system message logging
system clock
configuring
daylight saving time 5-13
manually 5-11
summer time 5-13
time zones 5-12
displaying the time and date 5-12
overview 5-2
See also NTP
system message logging
default configuration 23-3
defining error message severity levels 23-8
disabling 23-4
displaying the configuration 23-12
enabling 23-4
facility keywords, described 23-11
level keywords, described 23-8
limiting messages 23-9
message format 23-2
overview 23-1
sequence numbers, enabling and disabling 23-7
setting the display destination device 23-4
synchronizing log messages 23-5
timestamps, enabling and disabling 23-7
UNIX syslog servers
configuring the daemon 23-10
configuring the logging facility 23-11
facilities supported 23-11
system MTU
and 802.1Q tunneling 13-5
and EoMPLS 30-14
and IS-IS LSPs 28-70
configuring 9-19
maximum size supported 9-19
system name
default configuration 5-15
default setting 5-15
manual configuration 5-15
See also DNS
system prompt
default setting 5-15
manual configuration 5-16
system resources, optimizing 6-1
system routes, IGRP 28-23
system routing
IS-IS 28-63
ISO IGRP 28-63
T
TACACS+
accounting, defined 7-11
authentication, defined 7-11
authorization, defined 7-11
configuring
accounting 7-16
authentication key 7-13
authorization 7-16
login authentication 7-14
default configuration 7-13
displaying the configuration 7-17
identifying the server 7-13
limiting the services to the user 7-16
operation of 7-12
overview 7-10
tracking services accessed by user 7-16
TAC website xxxvii
tag distribution protocol
See TDP
tagged packets
802.1Q 13-3
Layer 2 protocol 13-10
tail drop
configuring 26-86
described 26-27
tar files
creating B-6
displaying the contents of B-6
extracting B-7
image file format B-20
TDP 30-6
technical assistance
case priority definitions xxxvii
opening a case xxxvii
TAC website xxxvi
Telnet
accessing management interfaces 2-10
from a browser 2-10
number of connections 1-3
setting a password 7-6
templates, SDM 6-2
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password 7-6
TFTP
configuration files
downloading B-11
preparing the server B-10
uploading B-11
configuration files in base directory 3-6
configuring for autoconfiguration 3-5
image files
deleting B-23
downloading B-22
preparing the server B-21
uploading B-23
limiting access by servers 24-13
threshold, traffic level 18-2
time
See NTP and system clock
time-range command 25-15
time ranges in ACLs 25-15
timestamps in log messages 23-7
time zones 5-12
Token Ring VLANs
support for 10-6
VTP support 11-4
traceroute, Layer 2
and ARP 34-11
and CDP 34-10
described 34-10
IP addresses and subnets 34-11
MAC addresses and VLANs 34-10
multicast traffic 34-10
multiple devices on a port 34-11
unicast traffic 34-10
usage guidelines 34-10
traceroute command 34-12
See also IP traceroute
traffic
blocking flooded 18-6
fragmented 25-5
unfragmented 25-5
traffic shaping
See shaping, average-rate
traffic suppression 18-1
transparent mode, VTP 11-3, 11-12
trap-door mechanism 3-2
traps
configuring MAC address notification 5-23
configuring managers 24-10
defined 24-3
enabling 5-23, 24-10
notification types 24-10
overview 24-1, 24-4
troubleshooting
connectivity problems 34-8, 34-10, 34-11
detecting unidirectional links 20-1
determining packet forwarding 34-14
displaying crash information 34-17
PIMv1 and PIMv2 interoperability problems 31-22
SFP security and identification 34-8
show forward command 34-14
troubleshooting (continued)
with CiscoWorks 24-4
with debug commands 34-13
with ping 34-8
with system message logging 23-1
with traceroute 34-11
trunk ports
and Layer 2 protocol tunneling 13-12
configuring 10-21
defined 9-3, 10-3
encapsulation 10-21, 10-26, 10-27
secure MAC addresses on 18-10
trunks
allowed-VLAN list 10-22
configuring 10-21, 10-26, 10-27
ISL 10-16
load sharing
setting STP path costs 10-26
using STP port priorities 10-25
native VLAN for untagged traffic 10-24
parallel 10-26
pruning-eligible list 10-23
to non-DTP device 10-17
understanding 10-17
trusted boundary for QoS 26-46
trusted port states
between QoS domains 26-47
classification options 26-6
ensuring port security for IP phones 26-46
within a QoS domain 26-42
tunneling
802.1Q 13-2
defined 13-1
Layer 2 protocol 13-11
tunnel ports
802.1Q, configuring 13-6
defined 10-4
described 9-3, 13-2
incompatibilities with other features 13-6
twisted-pair Ethernet, detecting unidirectional links 20-1
type of service 1-6
U
UDLD
aggressive mode, described 20-1
and autonegotiation 20-1
configuration guidelines 20-4
default configuration 20-4
echoing detection mechanism 20-3
enabling
globally 20-5
per interface 20-5
link-detection mechanism 20-1
modes of operation 20-1
neighbor database 20-2
normal mode, described 20-1
overview 20-1
resetting an interface 20-6
status, displaying 20-6
unidirectional link, defined 20-2
UDP, configuring 28-14
unauthorized ports with 802.1x 8-4
unequal-cost load balancing, IGRP 28-24
unicast storm control command 18-3
unicast storms 18-1
unicast traffic, blocking 18-6
UniDirectional Link Detection protocol
See UDLD
UNIX syslog servers
daemon configuration 23-10
facilities supported 23-11
message logging configuration 23-11
unrecognized Type-Length-Value (TLV) support 11-4
upgrading software images
See downloading
See release notes xxxv
UplinkFast
described 16-4
enabling 16-13
uploading
configuration files
preparing B-10, B-12, B-16
reasons for B-8
using FTP B-14
using RCP B-17
using TFTP B-11
image files
preparing B-21, B-24, B-28
reasons for B-19
using FTP B-27
using RCP B-31
using TFTP B-23
User Datagram Protocol
See UDP
user EXEC mode 2-2
username-based authentication 7-6
V
VCs 30-12
version-dependent transparent mode 11-4
virtual connections
See VCs
Virtual Private Networks
See VPNs
virtual router 29-1, 29-2
vlan.dat file 10-5
VLAN 1, disabling on a trunk port 10-22
VLAN 1 minimization 10-22
VLAN ACLs
See VLAN maps
vlan-assignment response, VMPS 10-28
VLAN configuration
at bootup 10-8
saving 10-8
VLAN configuration mode 2-2, 10-7
VLAN database
and startup configuration file 10-8
and VTP 11-1
VLAN configuration saved in 10-7
VLANs saved in 10-4
vlan database command 10-7
VLAN filtering, and SPAN 21-6
vlan global configuration command 10-7
VLAN ID
customer-side 13-7
discovering 5-26
mapping 13-7
service provider 13-8
VLAN IDs, number supported 1-4
VLAN ID translation
See VLAN mapping
VLAN management domain 11-2
VLAN Management Policy Server
See VMPS
VLAN map entries, order of 25-28
VLAN mapping
802.1Q traffic 13-9
configuring 13-9
described 13-7
VLAN maps
applying 25-31
common uses for 25-31
configuration example 25-32
configuration guidelines 25-28
configuring 25-27
creating 25-28
defined 25-2
denying access example 25-33
denying and permitting packets 25-29
displaying 25-38
examples 25-33
with router ACLs 25-38
VLAN membership
confirming 10-31
modes 10-3
VLAN Query Protocol
See VQP
VLANs
adding to VLAN database 10-9
aging dynamic addresses 14-9
allowed on trunk 10-22
and spanning-tree instances 10-3, 10-6, 10-13
configuration guidelines
extended-range VLANs 10-13
normal-range VLANs 10-6
configuration options 10-7
configuring 10-1
configuring IDs 1006 to 4094 10-13
connecting through SVIs 9-5
creating 10-9
creating in config-vlan mode 10-9
creating in VLAN configuration mode 10-10
customer numbering in service-provider networks 13-3
default configuration 10-8
deleting 10-11
described 9-2, 10-1
displaying 10-16
extended-range 10-1, 10-12
features 1-4
illustrated 10-2
internal 10-13
limiting source traffic
with RSPAN 21-22
with SPAN 21-15
modifying 10-9
native, configuring 10-24
normal-range 10-1, 10-4
number supported 1-4
parameters 10-5
port membership modes 10-3
VLANs (continued)
static-access ports 10-11
STP and 802.1Q trunks 14-10
supported 10-3
Token Ring 10-6
traffic between 10-2
VLAN-bridge STP 14-11, 33-1
VTP modes 11-3
VLAN Trunking Protocol
See VTP
VLAN trunks 10-16, 10-17
VMPS
administering 10-33
configuration example 10-34
configuration guidelines 10-29
default configuration 10-29
description 10-28
dynamic port membership
described 10-29
reconfirming 10-32
troubleshooting 10-33
entering server address 10-30
mapping MAC addresses to VLANs 10-28
monitoring 10-33
reconfirmation interval, changing 10-32
reconfirming membership 10-31
retry count, changing 10-32
voice-over-IP 12-1
voice VLAN
Cisco 7960 phone, port connections 12-1
configuration guidelines 12-3
configuring IP phones for data traffic
override CoS of incoming frame 12-5
trust CoS priority of incoming frame 12-5
configuring ports for voice traffic in
802.1P priority tagged frames 12-5
802.1Q frames 12-4
voice VLAN (continued)
connecting to an IP phone 12-4
default configuration 12-3
described 12-1
displaying 12-6
VPN routing and forwarding table
See VRF
VPNs
and multi-VRF CE 28-80
benefits 30-3
configuring 30-8
configuring routing sessions 28-80
described 30-2
forwarding in 28-78
in service provider networks 28-76
IPv4 prefix 30-5
MPLS 30-6
number supported 30-6
routes 28-76, 30-2, 30-5
VPN services
Layer 2 1-4
Layer 3 1-5
VQP 10-28
VRF
configuration 30-8
defining 28-78
elements 30-3
in MPLS VPNs 30-2
tables 28-76
VTP
adding a client to a domain 11-15
advertisements 10-20, 11-3
and extended-range VLANs 11-1
and normal-range VLANs 11-2
client mode, configuring 11-11
VTP (continued)
configuration
global configuration mode 11-7
guidelines 11-8
privileged EXEC mode 11-7
requirements 11-9
saving 11-7
VLAN configuration mode 11-7
configuration mode options 11-7
configuration requirements 11-9
configuration revision number
guideline 11-15
resetting 11-15
configuring
client mode 11-11
server mode 11-9
transparent mode 11-12
consistency checks 11-4
default configuration 11-6
described 11-1
disabling 11-12
domain names 11-8
domains 11-2
Layer 2 protocol tunneling 13-11
modes
client 11-3, 11-11
server 11-3, 11-9
transitions 11-3
transparent 11-3, 11-12
monitoring 11-16
passwords 11-8
pruning
disabling 11-14
enabling 11-14
examples 11-5
overview 11-4
pruning-eligible list, changing 10-23
server mode, configuring 11-9
statistics 11-16
VTP (continued)
Token Ring support 11-4
transparent mode, configuring 11-12
using 11-1
version, guidelines 11-8
version 1 11-4
version 2
configuration guidelines 11-8
disabling 11-13
enabling 11-13
overview 11-4
W
Weighted Random Early Detection
See WRED
weighted tail drop
See WTD
WRED
configuring DSCP-based 26-89
configuring IP precedence-based 26-93
described 26-28
WTD
described 26-13
setting thresholds
egress queue-sets 26-69
ingress queues 26-65
X
XMODEM protocol 34-2