• Aucun résultat trouvé

Catalyst 3560 Switch Software Configuration Guide

N/A
N/A
Protected

Academic year: 2022

Partager "Catalyst 3560 Switch Software Configuration Guide"

Copied!
1034
0
0

Texte intégral

(1)

Corporate Headquarters Cisco Systems, Inc.

170 West Tasman Drive San Jose, CA 95134-1706 USA

http://www.cisco.com Tel: 408 526-4000

800 553-NETS (6387) Fax: 408 526-4100

Catalyst 3560 Switch Software Configuration Guide

Cisco IOS Release 12.2(25)SEC July 2005

(2)

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT

LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StrataView Plus, TeleRouter, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0502R)

Catalyst 3560 Switch Software Configuration Guide

© 2004–2005 Cisco Systems, Inc. All rights reserved.

(3)

C O N T E N T S

Preface xxxvii

Audience

xxxvii

Purpose

xxxvii

Conventions

xxxviii

Related Publications

xxxviii

Obtaining Documentation

xxxix

Cisco.com

xxxix

Product Documentation DVD

xl

Ordering Documentation

xl

Documentation Feedback

xl

Cisco Product Security Overview

xli

Reporting Security Problems in Cisco Products

xli

Obtaining Technical Assistance

xlii

Cisco Technical Support & Documentation Website

xlii

Submitting a Service Request

xlii

Definitions of Service Request Severity

xliii

Obtaining Additional Publications and Information

xliii

C H A P T E R 1 Overview 1-1

Features

1-1

Ease-of-Use and Ease-of-Deployment Features

1-2

Performance Features

1-3

Management Options

1-4

Manageability Features

1-4

Availability Features

1-5

VLAN Features

1-6

Security Features

1-7

QoS and CoS Features

1-8

Layer 3 Features

1-9

Power over Ethernet Features

1-10

Monitoring Features

1-10

Default Settings After Initial Switch Configuration

1-11

(4)

Network Configuration Examples

1-13

Design Concepts for Using the Switch

1-14

Small to Medium-Sized Network Using Catalyst 3560 Switches

1-17

Large Network Using Catalyst 3560 Switches

1-19

Long-Distance, High-Bandwidth Transport Configuration

1-20

Where to Go Next

1-21

C H A P T E R 2 Using the Command-Line Interface 2-1

Understanding Command Modes

2-1

Understanding the Help System

2-3

Understanding Abbreviated Commands

2-4

Understanding no and default Forms of Commands

2-4

Understanding CLI Error Messages

2-5

Using Configuration Logging

2-5

Using Command History

2-6

Changing the Command History Buffer Size

2-6

Recalling Commands

2-6

Disabling the Command History Feature

2-7

Using Editing Features

2-7

Enabling and Disabling Editing Features

2-7

Editing Commands through Keystrokes

2-7

Editing Command Lines that Wrap

2-9

Searching and Filtering Output of show and more Commands

2-10

Accessing the CLI

2-10

Accessing the CLI through a Console Connection or through Telnet

2-10

C H A P T E R 3 Assigning the Switch IP Address and Default Gateway 3-1

Understanding the Boot Process

3-1

Assigning Switch Information

3-2

Default Switch Information

3-3

Understanding DHCP-Based Autoconfiguration

3-3

DHCP Client Request Process

3-4

Configuring DHCP-Based Autoconfiguration

3-5

DHCP Server Configuration Guidelines

3-5

Configuring the TFTP Server

3-5

Configuring the DNS

3-6

Configuring the Relay Device

3-6

(5)

Contents

Obtaining Configuration Files

3-7

Example Configuration

3-8

Manually Assigning IP Information

3-9

Checking and Saving the Running Configuration

3-10

Modifying the Startup Configuration

3-11

Default Boot Configuration

3-12

Automatically Downloading a Configuration File

3-12

Specifying the Filename to Read and Write the System Configuration

3-12

Booting Manually

3-13

Booting a Specific Software Image

3-13

Controlling Environment Variables

3-14

Scheduling a Reload of the Software Image

3-15

Configuring a Scheduled Reload

3-16

Displaying Scheduled Reload Information

3-17

C H A P T E R 4 Configuring IE2100 CNS Agents 4-1

Understanding IE2100 Series Configuration Registrar Software

4-1

CNS Configuration Service

4-2

CNS Event Service

4-3

NameSpace Mapper

4-3

What You Should Know About ConfigID, DeviceID, and Hostname

4-3

ConfigID

4-3

DeviceID

4-4

Hostname and DeviceID

4-4

Using Hostname, DeviceID, and ConfigID

4-4

Understanding CNS Embedded Agents

4-5

Initial Configuration

4-5

Incremental (Partial) Configuration

4-6

Synchronized Configuration

4-6

Configuring CNS Embedded Agents

4-6

Enabling Automated CNS Configuration

4-6

Enabling the CNS Event Agent

4-8

Enabling the CNS Configuration Agent

4-9

Enabling an Initial Configuration

4-9

Enabling a Partial Configuration

4-12

Displaying CNS Configuration

4-13

(6)

C H A P T E R 5 Clustering Switches 5-1

Understanding Switch Clusters

5-1

Clustering Overview

5-1

Cluster Command Switch Characteristics

5-2

Standby Cluster Command Switch Characteristics

5-2

Candidate Switch and Cluster Member Switch Characteristics

5-3

Using the CLI to Manage Switch Clusters

5-3

Catalyst 1900 and Catalyst 2820 CLI Considerations

5-4

Using SNMP to Manage Switch Clusters

5-4

C H A P T E R 6 Administering the Switch 6-1

Managing the System Time and Date

6-1

Understanding the System Clock

6-2

Understanding Network Time Protocol

6-2

Configuring NTP

6-4

Default NTP Configuration

6-4

Configuring NTP Authentication

6-5

Configuring NTP Associations

6-6

Configuring NTP Broadcast Service

6-7

Configuring NTP Access Restrictions

6-8

Configuring the Source IP Address for NTP Packets

6-10

Displaying the NTP Configuration

6-11

Configuring Time and Date Manually

6-11

Setting the System Clock

6-11

Displaying the Time and Date Configuration

6-12

Configuring the Time Zone

6-12

Configuring Summer Time (Daylight Saving Time)

6-13

Configuring a System Name and Prompt

6-14

Default System Name and Prompt Configuration

6-15

Configuring a System Name

6-15

Understanding DNS

6-15

Default DNS Configuration

6-16

Setting Up DNS

6-16

Displaying the DNS Configuration

6-17

Creating a Banner

6-17

Default Banner Configuration

6-17

Configuring a Message-of-the-Day Login Banner

6-18

Configuring a Login Banner

6-19

(7)

Contents

Managing the MAC Address Table

6-19

Building the Address Table

6-20

MAC Addresses and VLANs

6-20

Default MAC Address Table Configuration

6-21

Changing the Address Aging Time

6-21

Removing Dynamic Address Entries

6-21

Configuring MAC Address Notification Traps

6-22

Adding and Removing Static Address Entries

6-24

Configuring Unicast MAC Address Filtering

6-25

Displaying Address Table Entries

6-26

Managing the ARP Table

6-26

C H A P T E R 7 Configuring SDM Templates 7-1

Understanding the SDM Templates

7-1

Dual IPv4 and IPv6 SDM Templates

7-2

Configuring the Switch SDM Template

7-3

Default SDM Template

7-3

SDM Template Configuration Guidelines

7-4

Setting the SDM Template

7-4

Displaying the SDM Templates

7-5

C H A P T E R 8 Configuring Switch-Based Authentication 8-1

Preventing Unauthorized Access to Your Switch

8-1

Protecting Access to Privileged EXEC Commands

8-2

Default Password and Privilege Level Configuration

8-2

Setting or Changing a Static Enable Password

8-3

Protecting Enable and Enable Secret Passwords with Encryption

8-3

Disabling Password Recovery

8-5

Setting a Telnet Password for a Terminal Line

8-6

Configuring Username and Password Pairs

8-6

Configuring Multiple Privilege Levels

8-8

Setting the Privilege Level for a Command

8-8

Changing the Default Privilege Level for Lines

8-9

Logging into and Exiting a Privilege Level

8-10

Controlling Switch Access with TACACS+

8-10

Understanding TACACS+

8-10

TACACS+ Operation

8-12

(8)

Configuring TACACS+

8-12

Default TACACS+ Configuration

8-13

Identifying the TACACS+ Server Host and Setting the Authentication Key

8-13

Configuring TACACS+ Login Authentication

8-14

Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services

8-16

Starting TACACS+ Accounting

8-17

Displaying the TACACS+ Configuration

8-17

Controlling Switch Access with RADIUS

8-17

Understanding RADIUS

8-18

RADIUS Operation

8-19

Configuring RADIUS

8-19

Default RADIUS Configuration

8-20

Identifying the RADIUS Server Host

8-20

Configuring RADIUS Login Authentication

8-23

Defining AAA Server Groups

8-25

Configuring RADIUS Authorization for User Privileged Access and Network Services

8-27

Starting RADIUS Accounting

8-28

Configuring Settings for All RADIUS Servers

8-29

Configuring the Switch to Use Vendor-Specific RADIUS Attributes

8-29

Configuring the Switch for Vendor-Proprietary RADIUS Server Communication

8-30

Displaying the RADIUS Configuration

8-31

Controlling Switch Access with Kerberos

8-32

Understanding Kerberos

8-32

Kerberos Operation

8-34

Authenticating to a Boundary Switch

8-35

Obtaining a TGT from a KDC

8-35

Authenticating to Network Services

8-35

Configuring Kerberos

8-36

Configuring the Switch for Local Authentication and Authorization

8-36

Configuring the Switch for Secure Shell

8-37

Understanding SSH

8-38

SSH Servers, Integrated Clients, and Supported Versions

8-38

Limitations

8-38

Configuring SSH

8-39

Configuration Guidelines

8-39

Setting Up the Switch to Run SSH

8-39

Configuring the SSH Server

8-40

Displaying the SSH Configuration and Status

8-41

(9)

Contents

Configuring the Switch for Secure Socket Layer HTTP

8-41

Understanding Secure HTTP Servers and Clients

8-42

Certificate Authority Trustpoints

8-42

CipherSuites

8-43

Configuring Secure HTTP Servers and Clients

8-44

Default SSL Configuration

8-44

SSL Configuration Guidelines

8-44

Configuring a CA Trustpoint

8-45

Configuring the Secure HTTP Server

8-46

Configuring the Secure HTTP Client

8-47

Displaying Secure HTTP Server and Client Status

8-48

Configuring the Switch for Secure Copy Protocol

8-48

C H A P T E R 9 Configuring IEEE 802.1x Port-Based Authentication 9-1

Understanding IEEE 802.1x Port-Based Authentication

9-1

Device Roles

9-2

Authentication Initiation and Message Exchange

9-3

Ports in Authorized and Unauthorized States

9-4

IEEE 802.1x Accounting

9-5

IEEE 802.1x Accounting Attribute-Value Pairs

9-5

IEEE 802.1x Host Mode

9-6

Using IEEE 802.1x with Port Security

9-7

Using IEEE 802.1x with Voice VLAN Ports

9-8

Using IEEE 802.1x with VLAN Assignment

9-8

Using IEEE 802.1x with Guest VLAN

9-10

Using IEEE 802.1x with Wake-on-LAN

9-10

Unidirectional State

9-10

Bidirectional State

9-11

Using IEEE 802.1x with Per-User ACLs

9-11

Configuring IEEE 802.1x Authentication

9-12

Default IEEE 802.1x Configuration

9-12

IEEE 802.1x Configuration Guidelines

9-14

Configuring IEEE 802.1x Authentication

9-15

Configuring the Switch-to-RADIUS-Server Communication

9-16

Configuring IEEE 802.1x Authentication Using a RADIUS Server

9-18

Configuring Periodic Re-Authentication

9-18

Manually Re-Authenticating a Client Connected to a Port

9-19

Changing the Quiet Period

9-19

Changing the Switch-to-Client Retransmission Time

9-20

(10)

Setting the Switch-to-Client Frame-Retransmission Number

9-21

Setting the Re-Authentication Number

9-21

Configuring the Host Mode

9-22

Configuring a Guest VLAN

9-23

Resetting the IEEE 802.1x Configuration to the Default Values

9-24

Configuring IEEE 802.1x Accounting

9-25

Displaying IEEE 802.1x Statistics and Status

9-26

C H A P T E R 10 Configuring Interface Characteristics 10-1

Understanding Interface Types

10-1

Port-Based VLANs

10-2

Switch Ports

10-2

Access Ports

10-3

Trunk Ports

10-3

Tunnel Ports

10-4

Routed Ports

10-4

Switch Virtual Interfaces

10-5

EtherChannel Port Groups

10-5

Power over Ethernet Ports

10-6

Supported Protocols and Standards

10-6

Powered-Device Detection and Initial Power Allocation

10-7

Power Management Modes

10-8

Connecting Interfaces

10-9

Using Interface Configuration Mode

10-10

Procedures for Configuring Interfaces

10-10

Configuring a Range of Interfaces

10-11

Configuring and Using Interface Range Macros

10-12

Configuring Ethernet Interfaces

10-14

Default Ethernet Interface Configuration

10-14

Configuring Interface Speed and Duplex Mode

10-15

Configuration Guidelines

10-16

Setting the Interface Speed and Duplex Parameters

10-17

Configuring IEEE 802.3z Flow Control

10-18

Configuring Auto-MDIX on an Interface

10-19

Configuring a Power Management Mode on a PoE Port

10-20

Adding a Description for an Interface

10-21

Configuring Layer 3 Interfaces

10-22

Configuring the System MTU

10-24

(11)

Contents

Monitoring Interface Status

10-25

Clearing and Resetting Interfaces and Counters

10-26

Shutting Down and Restarting the Interface

10-26

C H A P T E R 11 Configuring Smartports Macros 11-1

Understanding Smartports Macros

11-1

Configuring Smartports Macros

11-2

Default Smartports Macro Configuration

11-2

Smartports Macro Configuration Guidelines

11-3

Creating Smartports Macros

11-4

Applying Smartports Macros

11-5

Applying Cisco-Default Smartports Macros

11-6

Displaying Smartports Macros

11-8

C H A P T E R 12 Configuring VLANs 12-1

Understanding VLANs

12-1

Supported VLANs

12-2

VLAN Port Membership Modes

12-3

Configuring Normal-Range VLANs

12-4

Token Ring VLANs

12-6

Normal-Range VLAN Configuration Guidelines

12-6

VLAN Configuration Mode Options

12-7

VLAN Configuration in config-vlan Mode

12-7

VLAN Configuration in VLAN Database Configuration Mode

12-7

Saving VLAN Configuration

12-7

Default Ethernet VLAN Configuration

12-8

Creating or Modifying an Ethernet VLAN

12-9

Deleting a VLAN

12-10

Assigning Static-Access Ports to a VLAN

12-11

Configuring Extended-Range VLANs

12-12

Default VLAN Configuration

12-12

Extended-Range VLAN Configuration Guidelines

12-13

Creating an Extended-Range VLAN

12-14

Creating an Extended-Range VLAN with an Internal VLAN ID

12-15

Displaying VLANs

12-16

(12)

Configuring VLAN Trunks

12-16

Trunking Overview

12-16

Encapsulation Types

12-18

IEEE 802.1Q Configuration Considerations

12-19

Default Layer 2 Ethernet Interface VLAN Configuration

12-19

Configuring an Ethernet Interface as a Trunk Port

12-19

Interaction with Other Features

12-20

Configuring a Trunk Port

12-21

Defining the Allowed VLANs on a Trunk

12-22

Changing the Pruning-Eligible List

12-23

Configuring the Native VLAN for Untagged Traffic

12-23

Configuring Trunk Ports for Load Sharing

12-24

Load Sharing Using STP Port Priorities

12-24

Load Sharing Using STP Path Cost

12-26

Configuring VMPS

12-28

Understanding VMPS

12-28

Dynamic-Access Port VLAN Membership

12-29

Default VMPS Client Configuration

12-29

VMPS Configuration Guidelines

12-29

Configuring the VMPS Client

12-30

Entering the IP Address of the VMPS

12-30

Configuring Dynamic-Access Ports on VMPS Clients

12-31

Reconfirming VLAN Memberships

12-31

Changing the Reconfirmation Interval

12-31

Changing the Retry Count

12-32

Monitoring the VMPS

12-32

Troubleshooting Dynamic-Access Port VLAN Membership

12-33

VMPS Configuration Example

12-33

C H A P T E R 13 Configuring VTP 13-1

Understanding VTP

13-1

The VTP Domain

13-2

VTP Modes

13-3

VTP Advertisements

13-3

VTP Version 2

13-4

VTP Pruning

13-4

(13)

Contents

Configuring VTP

13-6

Default VTP Configuration

13-6

VTP Configuration Options

13-7

VTP Configuration in Global Configuration Mode

13-7

VTP Configuration in VLAN Database Configuration Mode

13-7

VTP Configuration Guidelines

13-8

Domain Names

13-8

Passwords

13-8

VTP Version

13-8

Configuration Requirements

13-9

Configuring a VTP Server

13-9

Configuring a VTP Client

13-11

Disabling VTP (VTP Transparent Mode)

13-12

Enabling VTP Version 2

13-13

Enabling VTP Pruning

13-14

Adding a VTP Client Switch to a VTP Domain

13-14

Monitoring VTP

13-16

C H A P T E R 14 Configuring Private VLANs 14-1

Understanding Private VLANs

14-1

IP Addressing Scheme with Private VLANs

14-3

Private VLANs across Multiple Switches

14-4

Private-VLAN Interaction with Other Features

14-4

Private VLANs and Unicast, Broadcast, and Multicast Traffic

14-5

Private VLANs and SVIs

14-5

Configuring Private VLANs

14-5

Tasks for Configuring Private VLANs

14-6

Default Private-VLAN Configuration

14-6

Private-VLAN Configuration Guidelines

14-6

Secondary and Primary VLAN Configuration

14-6

Private-VLAN Port Configuration

14-8

Limitations with Other Features

14-8

Configuring and Associating VLANs in a Private VLAN

14-9

Configuring a Layer 2 Interface as a Private-VLAN Host Port

14-11

Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port

14-12

Mapping Secondary VLANs to a Primary VLAN Layer 3 VLAN Interface

14-13

Monitoring Private VLANs

14-14

(14)

C H A P T E R 15 Configuring Voice VLAN 15-1

Understanding Voice VLAN

15-1

Cisco IP Phone Voice Traffic

15-2

Cisco IP Phone Data Traffic

15-2

Configuring Voice VLAN

15-3

Default Voice VLAN Configuration

15-3

Voice VLAN Configuration Guidelines

15-3

Configuring a Port Connected to a Cisco 7960 IP Phone

15-4

Configuring IP Phone Voice Traffic

15-5

Configuring the Priority of Incoming Data Frames

15-6

Displaying Voice VLAN

15-7

C H A P T E R 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling 16-1

Understanding IEEE 802.1Q Tunneling

16-1

Configuring IEEE 802.1Q Tunneling

16-4

Default IEEE 802.1Q Tunneling Configuration

16-4

IEEE 802.1Q Tunneling Configuration Guidelines

16-4

Native VLANs

16-4

System MTU

16-5

IEEE 802.1Q Tunneling and Other Features

16-6

Configuring an IEEE 802.1Q Tunneling Port

16-6

Understanding Layer 2 Protocol Tunneling

16-7

Configuring Layer 2 Protocol Tunneling

16-10

Default Layer 2 Protocol Tunneling Configuration

16-11

Layer 2 Protocol Tunneling Configuration Guidelines

16-11

Configuring Layer 2 Protocol Tunneling

16-13

Configuring Layer 2 Tunneling for EtherChannels

16-14

Configuring the SP Edge Switch

16-15

Configuring the Customer Switch

16-16

Monitoring and Maintaining Tunneling Status

16-18

(15)

Contents

C H A P T E R 17 Configuring STP 17-1

Understanding Spanning-Tree Features

17-1

STP Overview

17-2

Spanning-Tree Topology and BPDUs

17-3

Bridge ID, Switch Priority, and Extended System ID

17-4

Spanning-Tree Interface States

17-4

Blocking State

17-6

Listening State

17-6

Learning State

17-6

Forwarding State

17-6

Disabled State

17-7

How a Switch or Port Becomes the Root Switch or Root Port

17-7

Spanning Tree and Redundant Connectivity

17-8

Spanning-Tree Address Management

17-8

Accelerated Aging to Retain Connectivity

17-8

Spanning-Tree Modes and Protocols

17-9

Supported Spanning-Tree Instances

17-9

Spanning-Tree Interoperability and Backward Compatibility

17-10

STP and IEEE 802.1Q Trunks

17-10

VLAN-Bridge Spanning Tree

17-10

Configuring Spanning-Tree Features

17-11

Default Spanning-Tree Configuration

17-11

Spanning-Tree Configuration Guidelines

17-12

Changing the Spanning-Tree Mode.

17-13

Disabling Spanning Tree

17-14

Configuring the Root Switch

17-14

Configuring a Secondary Root Switch

17-16

Configuring Port Priority

17-16

Configuring Path Cost

17-17

Configuring the Switch Priority of a VLAN

17-19

Configuring Spanning-Tree Timers

17-19

Configuring the Hello Time

17-20

Configuring the Forwarding-Delay Time for a VLAN

17-21

Configuring the Maximum-Aging Time for a VLAN

17-21

Configuring the Transmit Hold-Count

17-22

Displaying the Spanning-Tree Status

17-22

(16)

C H A P T E R 18 Configuring MSTP 18-1

Understanding MSTP

18-2

Multiple Spanning-Tree Regions

18-2

IST, CIST, and CST

18-3

Operations Within an MST Region

18-3

Operations Between MST Regions

18-4

IEEE 802.1s Terminology

18-5

Hop Count

18-5

Boundary Ports

18-6

IEEE 802.1s Implementation

18-6

Port Role Naming Change

18-7

Interoperation Between Legacy and Standard Switches

18-7

Detecting Unidirectional Link Failure

18-8

Interoperability with IEEE 802.1D STP

18-8

Understanding RSTP

18-8

Port Roles and the Active Topology

18-9

Rapid Convergence

18-10

Synchronization of Port Roles

18-11

Bridge Protocol Data Unit Format and Processing

18-12

Processing Superior BPDU Information

18-13

Processing Inferior BPDU Information

18-13

Topology Changes

18-13

Configuring MSTP Features

18-14

Default MSTP Configuration

18-14

MSTP Configuration Guidelines

18-15

Specifying the MST Region Configuration and Enabling MSTP

18-16

Configuring the Root Switch

18-17

Configuring a Secondary Root Switch

18-18

Configuring Port Priority

18-20

Configuring Path Cost

18-21

Configuring the Switch Priority

18-22

Configuring the Hello Time

18-22

Configuring the Forwarding-Delay Time

18-23

Configuring the Maximum-Aging Time

18-24

Configuring the Maximum-Hop Count

18-24

Specifying the Link Type to Ensure Rapid Transitions

18-25

Designating the Neighbor Type

18-25

Restarting the Protocol Migration Process

18-26

Displaying the MST Configuration and Status

(17)

Contents

C H A P T E R 19 Configuring Optional Spanning-Tree Features 19-1

Understanding Optional Spanning-Tree Features

19-1

Understanding Port Fast

19-2

Understanding BPDU Guard

19-3

Understanding BPDU Filtering

19-3

Understanding UplinkFast

19-4

Understanding BackboneFast

19-5

Understanding EtherChannel Guard

19-7

Understanding Root Guard

19-8

Understanding Loop Guard

19-9

Configuring Optional Spanning-Tree Features

19-9

Default Optional Spanning-Tree Configuration

19-9

Optional Spanning-Tree Configuration Guidelines

19-10

Enabling Port Fast

19-10

Enabling BPDU Guard

19-11

Enabling BPDU Filtering

19-12

Enabling UplinkFast for Use with Redundant Links

19-12

Enabling BackboneFast

19-13

Enabling EtherChannel Guard

19-14

Enabling Root Guard

19-14

Enabling Loop Guard

19-15

Displaying the Spanning-Tree Status

19-16

C H A P T E R 20 Configuring Flex Links 20-1

Understanding Flex Links

20-1

Configuring Flex Links

20-2

Default Flex Link Configuration

20-2

Flex Link Configuration Guidelines

20-2

Configuring Flex Links

20-3

Monitoring Flex Links

20-3

C H A P T E R 21 Configuring DHCP Features and IP Source Guard 21-1

Understanding DHCP Features

21-1

DHCP Server

21-2

DHCP Relay Agent

21-2

DHCP Snooping

21-2

Option-82 Data Insertion

21-3

Cisco IOS DHCP Server Database

21-5

DHCP Snooping Binding Database

(18)

Configuring DHCP Features

21-7

Default DHCP Configuration

21-7

DHCP Snooping Configuration Guidelines

21-8

Configuring the DHCP Server

21-9

Configuring the DHCP Relay Agent

21-9

Specifying the Packet Forwarding Address

21-9

Enabling DHCP Snooping and Option 82

21-10

Enabling DHCP Snooping on Private VLANs

21-12

Enabling the Cisco IOS DHCP Server Database

21-12

Enabling the DHCP Snooping Binding Database Agent

21-12

Displaying DHCP Snooping Information

21-13

Understanding IP Source Guard

21-14

Source IP Address Filtering

21-14

Source IP and MAC Address Filtering

21-14

Configuring IP Source Guard

21-15

Default IP Source Guard Configuration

21-15

IP Source Guard Configuration Guidelines

21-15

Enabling IP Source Guard

21-16

Displaying IP Source Guard Information

21-17

C H A P T E R 22 Configuring Dynamic ARP Inspection 22-1

Understanding Dynamic ARP Inspection

22-1

Interface Trust States and Network Security

22-3

Rate Limiting of ARP Packets

22-4

Relative Priority of ARP ACLs and DHCP Snooping Entries

22-4

Logging of Dropped Packets

22-4

Configuring Dynamic ARP Inspection

22-5

Default Dynamic ARP Inspection Configuration

22-5

Dynamic ARP Inspection Configuration Guidelines

22-6

Configuring Dynamic ARP Inspection in DHCP Environments

22-7

Configuring ARP ACLs for Non-DHCP Environments

22-8

Limiting the Rate of Incoming ARP Packets

22-10

Performing Validation Checks

22-11

Configuring the Log Buffer

22-12

Displaying Dynamic ARP Inspection Information

22-14

(19)

Contents

C H A P T E R 23 Configuring IGMP Snooping and MVR 23-1

Understanding IGMP Snooping

23-1

IGMP Versions

23-2

Joining a Multicast Group

23-3

Leaving a Multicast Group

23-4

Immediate Leave

23-5

IGMP Configurable-Leave Timer

23-5

IGMP Report Suppression

23-5

Configuring IGMP Snooping

23-6

Default IGMP Snooping Configuration

23-6

Enabling or Disabling IGMP Snooping

23-6

Setting the Snooping Method

23-7

Configuring a Multicast Router Port

23-8

Configuring a Host Statically to Join a Group

23-9

Enabling IGMP Immediate Leave

23-10

Configuring the IGMP Leave Timer

23-11

Configuring the IGMP Snooping Querier

23-11

Disabling IGMP Report Suppression

23-13

Displaying IGMP Snooping Information

23-13

Understanding Multicast VLAN Registration

23-14

Using MVR in a Multicast Television Application

23-15

Configuring MVR

23-17

Default MVR Configuration

23-17

MVR Configuration Guidelines and Limitations

23-17

Configuring MVR Global Parameters

23-18

Configuring MVR Interfaces

23-19

Displaying MVR Information

23-21

Configuring IGMP Filtering and Throttling

23-21

Default IGMP Filtering and Throttling Configuration

23-22

Configuring IGMP Profiles

23-22

Applying IGMP Profiles

23-24

Setting the Maximum Number of IGMP Groups

23-24

Configuring the IGMP Throttling Action

23-25

Displaying IGMP Filtering and Throttling Configuration

23-26

(20)

C H A P T E R 24 Configuring Port-Based Traffic Control 24-1

Configuring Storm Control

24-1

Understanding Storm Control

24-1

Default Storm Control Configuration

24-3

Configuring Storm Control and Threshold Levels

24-3

Configuring Protected Ports

24-5

Default Protected Port Configuration

24-5

Protected Port Configuration Guidelines

24-6

Configuring a Protected Port

24-6

Configuring Port Blocking

24-6

Default Port Blocking Configuration

24-7

Blocking Flooded Traffic on an Interface

24-7

Configuring Port Security

24-7

Understanding Port Security

24-8

Secure MAC Addresses

24-8

Security Violations

24-9

Default Port Security Configuration

24-10

Port Security Configuration Guidelines

24-10

Enabling and Configuring Port Security

24-12

Enabling and Configuring Port Security Aging

24-15

Displaying Port-Based Traffic Control Settings

24-16

C H A P T E R 25 Configuring CDP 26-1

Understanding CDP

26-1

Configuring CDP

26-2

Default CDP Configuration

26-2

Configuring the CDP Characteristics

26-2

Disabling and Enabling CDP

26-3

Disabling and Enabling CDP on an Interface

26-4

Monitoring and Maintaining CDP

26-5

C H A P T E R 26 Configuring UDLD 26-1

Understanding UDLD

26-1

Modes of Operation

26-1

Methods to Detect Unidirectional Links

26-2

Configuring UDLD

26-4

Default UDLD Configuration

26-4

Configuration Guidelines

26-4

(21)

Contents

Enabling UDLD Globally

26-5

Enabling UDLD on an Interface

26-5

Resetting an Interface Disabled by UDLD

26-6

Displaying UDLD Status

26-6

C H A P T E R 27 Configuring SPAN and RSPAN 27-1

Understanding SPAN and RSPAN

27-1

Local SPAN

27-2

Remote SPAN

27-2

SPAN and RSPAN Concepts and Terminology

27-3

SPAN Sessions

27-3

Monitored Traffic

27-4

Source Ports

27-5

Source VLANs

27-6

VLAN Filtering

27-6

Destination Port

27-6

RSPAN VLAN

27-8

SPAN and RSPAN Interaction with Other Features

27-8

Configuring SPAN and RSPAN

27-9

Default SPAN and RSPAN Configuration

27-9

Configuring Local SPAN

27-10

SPAN Configuration Guidelines

27-10

Creating a Local SPAN Session

27-11

Creating a Local SPAN Session and Configuring Ingress Traffic

27-13

Specifying VLANs to Filter

27-15

Configuring RSPAN

27-16

RSPAN Configuration Guidelines

27-16

Configuring a VLAN as an RSPAN VLAN

27-17

Creating an RSPAN Source Session

27-18

Creating an RSPAN Destination Session

27-19

Creating an RSPAN Destination Session and Configuring Ingress Traffic

27-20

Specifying VLANs to Filter

27-22

Displaying SPAN and RSPAN Status

27-23

C H A P T E R 28 Configuring RMON 28-1

Understanding RMON

28-1

Configuring RMON

28-2

Default RMON Configuration

28-3

Configuring RMON Alarms and Events

28-3

(22)

Collecting Group History Statistics on an Interface

28-5

Collecting Group Ethernet Statistics on an Interface

28-6

Displaying RMON Status

28-6

C H A P T E R 29 Configuring System Message Logging 29-1

Understanding System Message Logging

29-1

Configuring System Message Logging

29-2

System Log Message Format

29-2

Default System Message Logging Configuration

29-3

Disabling Message Logging

29-3

Setting the Message Display Destination Device

29-4

Synchronizing Log Messages

29-5

Enabling and Disabling Time Stamps on Log Messages

29-7

Enabling and Disabling Sequence Numbers in Log Messages

29-7

Defining the Message Severity Level

29-8

Limiting Syslog Messages Sent to the History Table and to SNMP

29-9

Configuring UNIX Syslog Servers

29-10

Logging Messages to a UNIX Syslog Daemon

29-11

Configuring the UNIX System Logging Facility

29-11

Displaying the Logging Configuration

29-12

C H A P T E R 30 Configuring SNMP 30-1

Understanding SNMP

30-1

SNMP Versions

30-2

SNMP Manager Functions

30-3

SNMP Agent Functions

30-4

SNMP Community Strings

30-4

Using SNMP to Access MIB Variables

30-4

SNMP Notifications

30-5

SNMP ifIndex MIB Object Values

30-5

Configuring SNMP

30-6

Default SNMP Configuration

30-6

SNMP Configuration Guidelines

30-7

Disabling the SNMP Agent

30-8

Configuring Community Strings

30-8

Configuring SNMP Groups and Users

30-9

Configuring SNMP Notifications

30-11

Setting the Agent Contact and Location Information

30-14

(23)

Contents

Limiting TFTP Servers Used Through SNMP

30-15

SNMP Examples

30-15

Displaying SNMP Status

30-16

C H A P T E R 31 Configuring Network Security with ACLs 31-1

Understanding ACLs

31-1

Supported ACLs

31-2

Port ACLs

31-3

Router ACLs

31-4

VLAN Maps

31-5

Handling Fragmented and Unfragmented Traffic

31-5

Configuring IPv4 ACLs

31-6

Creating Standard and Extended IPv4 ACLs

31-7

Access List Numbers

31-8

ACL Logging

31-8

Creating a Numbered Standard ACL

31-9

Creating a Numbered Extended ACL

31-10

Resequencing ACEs in an ACL

31-14

Creating Named Standard and Extended ACLs

31-14

Using Time Ranges with ACLs

31-16

Including Comments in ACLs

31-18

Applying an IPv4 ACL to a Terminal Line

31-18

Applying an IPv4 ACL to an Interface

31-19

Hardware and Software Treatment of IP ACLs

31-21

IPv4 ACL Configuration Examples

31-21

Numbered ACLs

31-23

Extended ACLs

31-23

Named ACLs

31-23

Time Range Applied to an IP ACL

31-24

Commented IP ACL Entries

31-24

ACL Logging

31-25

Creating Named MAC Extended ACLs

31-26

Applying a MAC ACL to a Layer 2 Interface

31-28

Configuring VLAN Maps

31-29

VLAN Map Configuration Guidelines

31-29

Creating a VLAN Map

31-30

Examples of ACLs and VLAN Maps

31-31

Applying a VLAN Map to a VLAN

31-33

Using VLAN Maps in Your Network

31-33

(24)

Wiring Closet Configuration

31-34

Denying Access to a Server on Another VLAN

31-35

Using VLAN Maps with Router ACLs

31-36

VLAN Maps and Router ACL Configuration Guidelines

31-36

Examples of Router ACLs and VLAN Maps Applied to VLANs

31-37

ACLs and Switched Packets

31-37

ACLs and Bridged Packets

31-38

ACLs and Routed Packets

31-38

ACLs and Multicast Packets

31-39

Displaying IPv4 ACL Configuration

31-40

C H A P T E R 32 Configuring QoS 32-1

Understanding QoS

32-2

Basic QoS Model

32-3

Classification

32-5

Classification Based on QoS ACLs

32-7

Classification Based on Class Maps and Policy Maps

32-7

Policing and Marking

32-8

Policing on Physical Ports

32-9

Policing on SVIs

32-10

Mapping Tables

32-12

Queueing and Scheduling Overview

32-13

Weighted Tail Drop

32-13

SRR Shaping and Sharing

32-14

Queueing and Scheduling on Ingress Queues

32-15

Queueing and Scheduling on Egress Queues

32-17

Packet Modification

32-19

Configuring Auto-QoS

32-20

Generated Auto-QoS Configuration

32-20

Effects of Auto-QoS on the Configuration

32-25

Auto-QoS Configuration Guidelines

32-25

Upgrading from a Previous Software Release

32-26

Enabling Auto-QoS for VoIP

32-27

Auto-QoS Configuration Example

32-28

Displaying Auto-QoS Information

32-30

(25)

Contents

Configuring Standard QoS

32-30

Default Standard QoS Configuration

32-31

Default Ingress Queue Configuration

32-31

Default Egress Queue Configuration

32-32

Default Mapping Table Configuration

32-33

Standard QoS Configuration Guidelines

32-33

QoS ACL Guidelines

32-33

Applying QoS on Interfaces

32-33

Policing Guidelines

32-34

General QoS Guidelines

32-34

Enabling QoS Globally

32-35

Enabling VLAN-Based QoS on Physical Ports

32-35

Configuring Classification Using Port Trust States

32-36

Configuring the Trust State on Ports within the QoS Domain

32-36

Configuring the CoS Value for an Interface

32-37

Configuring a Trusted Boundary to Ensure Port Security

32-38

Enabling DSCP Transparency Mode

32-39

Configuring the DSCP Trust State on a Port Bordering Another QoS Domain

32-40

Configuring a QoS Policy

32-42

Classifying Traffic by Using ACLs

32-43

Classifying Traffic by Using Class Maps

32-46

Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps

32-48

Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps

32-51

Classifying, Policing, and Marking Traffic by Using Aggregate Policers

32-58

Configuring DSCP Maps

32-60

Configuring the CoS-to-DSCP Map

32-60

Configuring the IP-Precedence-to-DSCP Map

32-61

Configuring the Policed-DSCP Map

32-62

Configuring the DSCP-to-CoS Map

32-63

Configuring the DSCP-to-DSCP-Mutation Map

32-64

Configuring Ingress Queue Characteristics

32-66

Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds

32-67

Allocating Buffer Space Between the Ingress Queues

32-68

Allocating Bandwidth Between the Ingress Queues

32-69

Configuring the Ingress Priority Queue

32-70

Configuring Egress Queue Characteristics

32-71

Configuration Guidelines

32-71

Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set

32-71

Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID

32-73

Configuring SRR Shaped Weights on Egress Queues

32-75

(26)

Configuring SRR Shared Weights on Egress Queues

32-76

Configuring the Egress Expedite Queue

32-77

Limiting the Bandwidth on an Egress Interface

32-77

Displaying Standard QoS Information

32-78

C H A P T E R 33 Configuring EtherChannels 33-1

Understanding EtherChannels

33-1

EtherChannel Overview

33-2

Port-Channel Interfaces

33-3

Port Aggregation Protocol

33-4

PAgP Modes

33-4

PAgP Interaction with Other Features

33-5

Link Aggregation Control Protocol

33-5

LACP Modes

33-6

LACP Interaction with Other Features

33-6

Load Balancing and Forwarding Methods

33-6

Configuring EtherChannels

33-8

Default EtherChannel Configuration

33-9

EtherChannel Configuration Guidelines

33-9

Configuring Layer 2 EtherChannels

33-10

Configuring Layer 3 EtherChannels

33-13

Creating Port-Channel Logical Interfaces

33-13

Configuring the Physical Interfaces

33-14

Configuring EtherChannel Load Balancing

33-16

Configuring the PAgP Learn Method and Priority

33-17

Configuring LACP Hot-Standby Ports

33-18

Configuring the LACP System Priority

33-19

Configuring the LACP Port Priority

33-19

Displaying EtherChannel, PAgP, and LACP Status

33-20

C H A P T E R 34 Configuring IP Unicast Routing 34-1

Understanding IP Routing

34-2

Types of Routing

34-2

Steps for Configuring Routing

34-3

Configuring IP Addressing

34-4

Default Addressing Configuration

34-4

Assigning IP Addresses to Network Interfaces

34-5

Use of Subnet Zero

34-6

(27)

Contents

Configuring Address Resolution Methods

34-8

Define a Static ARP Cache

34-9

Set ARP Encapsulation

34-10

Enable Proxy ARP

34-10

Routing Assistance When IP Routing is Disabled

34-11

Proxy ARP

34-11

Default Gateway

34-11

ICMP Router Discovery Protocol (IRDP)

34-12

Configuring Broadcast Packet Handling

34-13

Enabling Directed Broadcast-to-Physical Broadcast Translation

34-13

Forwarding UDP Broadcast Packets and Protocols

34-14

Establishing an IP Broadcast Address

34-15

Flooding IP Broadcasts

34-16

Monitoring and Maintaining IP Addressing

34-17

Enabling IP Unicast Routing

34-18

Configuring RIP

34-18

Default RIP Configuration

34-19

Configuring Basic RIP Parameters

34-20

Configuring RIP Authentication

34-21

Configuring Summary Addresses and Split Horizon

34-22

Configuring Split Horizon

34-23

Configuring OSPF

34-24

Default OSPF Configuration

34-25

Nonstop Forwarding Awareness

34-26

Configuring Basic OSPF Parameters

34-26

Configuring OSPF Interfaces

34-27

Configuring OSPF Area Parameters

34-28

Configuring Other OSPF Parameters

34-30

Changing LSA Group Pacing

34-32

Configuring a Loopback Interface

34-32

Monitoring OSPF

34-33

Configuring EIGRP

34-33

Default EIGRP Configuration

34-35

Nonstop Forwarding Awareness

34-36

Configuring Basic EIGRP Parameters

34-37

Configuring EIGRP Interfaces

34-37

Configuring EIGRP Route Authentication

34-38

Monitoring and Maintaining EIGRP

34-39

(28)

Configuring BGP

34-40

Default BGP Configuration

34-42

Nonstop Forwarding Awareness

34-44

Enabling BGP Routing

34-44

Managing Routing Policy Changes

34-47

Configuring BGP Decision Attributes

34-48

Configuring BGP Filtering with Route Maps

34-50

Configuring BGP Filtering by Neighbor

34-51

Configuring Prefix Lists for BGP Filtering

34-52

Configuring BGP Community Filtering

34-54

Configuring BGP Neighbors and Peer Groups

34-55

Configuring Aggregate Addresses

34-57

Configuring Routing Domain Confederations

34-58

Configuring BGP Route Reflectors

34-58

Configuring Route Dampening

34-59

Monitoring and Maintaining BGP

34-60

Configuring Multi-VRF CE

34-61

Understanding Multi-VRF CE

34-62

Default Multi-VRF CE Configuration

34-64

Multi-VRF CE Configuration Guidelines

34-64

Configuring VRFs

34-65

Configuring a VPN Routing Session

34-66

Configuring BGP PE to CE Routing Sessions

34-67

Multi-VRF CE Configuration Example

34-67

Displaying Multi-VRF CE Status

34-71

Configuring Protocol-Independent Features

34-72

Configuring Cisco Express Forwarding

34-72

Configuring the Number of Equal-Cost Routing Paths

34-73

Configuring Static Unicast Routes

34-74

Specifying Default Routes and Networks

34-75

Using Route Maps to Redistribute Routing Information

34-76

Configuring Policy-Based Routing

34-79

PBR Configuration Guidelines

34-80

Enabling PBR

34-81

Filtering Routing Information

34-82

Setting Passive Interfaces

34-82

Controlling Advertising and Processing in Routing Updates

34-83

Filtering Sources of Routing Information

34-84

Managing Authentication Keys

34-85

(29)

Contents

Monitoring and Maintaining the IP Network

34-86

C H A P T E R 35 Configuring IPv6 Unicast Routing 35-1

Understanding IPv6

35-1

IPv6 Addresses

35-2

Supported IPv6 Unicast Routing Features

35-3

128-Bit Wide Unicast Addresses

35-3

DNS for IPv6

35-4

Path MTU Discovery for IPv6 Unicast

35-4

ICMPv6

35-4

IPv6 Stateless Autoconfiguration and Duplicate Address Detection

35-4

IPv6 Applications

35-5

Dual IPv4 and IPv6 Protocol Stacks

35-5

Unsupported IPv6 Unicast Routing Features

35-6

Limitations

35-6

SDM Templates

35-7

Dual IPv4-and IPv6 SDM Templates

35-8

Configuring IPv6

35-9

Default IPv6 Configuration

35-9

Configuring IPv6 Addressing and Enabling IPv6 Routing

35-10

Configuring IPv4 and IPv6 Protocol Stacks

35-12

Configuring IPv6 ICMP Rate Limiting

35-14

Configuring CEF for IPv6

35-14

Configuring Static Routing for IPv6

35-15

Configuring RIP for IPv6

35-17

Configuring OSPF for IPv6

35-19

Displaying IPv6

35-21

C H A P T E R 36 Configuring HSRP 36-1

Understanding HSRP

36-1

Multiple HSRP

36-3

Configuring HSRP

36-4

Default HSRP Configuration

36-5

HSRP Configuration Guidelines

36-5

Enabling HSRP

36-5

Configuring HSRP Priority

36-6

Configuring MHSRP

36-9

Configuring HSRP Authentication and Timers

36-9

(30)

Enabling HSRP Support for ICMP Redirect Messages

36-11

Configuring HSRP Groups and Clustering

36-11

Displaying HSRP Configurations

36-11

C H A P T E R 37 Configuring IP Multicast Routing 37-1

Understanding Cisco’s Implementation of IP Multicast Routing

37-2

Understanding IGMP

37-2

IGMP Version 1

37-3

IGMP Version 2

37-3

Understanding PIM

37-3

PIM Versions

37-4

PIM Modes

37-4

Auto-RP

37-5

Bootstrap Router

37-5

Multicast Forwarding and Reverse Path Check

37-6

Understanding DVMRP

37-7

Understanding CGMP

37-8

Configuring IP Multicast Routing

37-8

Default Multicast Routing Configuration

37-8

Multicast Routing Configuration Guidelines

37-9

PIMv1 and PIMv2 Interoperability

37-9

Auto-RP and BSR Configuration Guidelines

37-10

Configuring Basic Multicast Routing

37-10

Configuring a Rendezvous Point

37-12

Manually Assigning an RP to Multicast Groups

37-12

Configuring Auto-RP

37-13

Configuring PIMv2 BSR

37-17

Using Auto-RP and a BSR

37-21

Monitoring the RP Mapping Information

37-22

Troubleshooting PIMv1 and PIMv2 Interoperability Problems

37-22

Configuring Advanced PIM Features

37-23

Understanding PIM Shared Tree and Source Tree

37-23

Delaying the Use of PIM Shortest-Path Tree

37-24

Modifying the PIM Router-Query Message Interval

37-25

Configuring Optional IGMP Features

37-26

Default IGMP Configuration

37-26

Configuring the Switch as a Member of a Group

37-26

Controlling Access to IP Multicast Groups

37-27

(31)

Contents

Modifying the IGMP Host-Query Message Interval

37-29

Changing the IGMP Query Timeout for IGMPv2

37-30

Changing the Maximum Query Response Time for IGMPv2

37-30

Configuring the Switch as a Statically Connected Member

37-31

Configuring Optional Multicast Routing Features

37-31

Enabling CGMP Server Support

37-32

Configuring sdr Listener Support

37-33

Enabling sdr Listener Support

37-33

Limiting How Long an sdr Cache Entry Exists

37-34

Configuring an IP Multicast Boundary

37-34

Configuring Basic DVMRP Interoperability Features

37-36

Configuring DVMRP Interoperability

37-36

Configuring a DVMRP Tunnel

37-38

Advertising Network 0.0.0.0 to DVMRP Neighbors

37-40

Responding to mrinfo Requests

37-41

Configuring Advanced DVMRP Interoperability Features

37-41

Enabling DVMRP Unicast Routing

37-42

Rejecting a DVMRP Nonpruning Neighbor

37-42

Controlling Route Exchanges

37-45

Limiting the Number of DVMRP Routes Advertised

37-45

Changing the DVMRP Route Threshold

37-45

Configuring a DVMRP Summary Address

37-46

Disabling DVMRP Autosummarization

37-48

Adding a Metric Offset to the DVMRP Route

37-48

Monitoring and Maintaining IP Multicast Routing

37-49

Clearing Caches, Tables, and Databases

37-49

Displaying System and Network Statistics

37-50

Monitoring IP Multicast Routing

37-51

C H A P T E R 38 Configuring MSDP 38-1

Understanding MSDP

38-1

MSDP Operation

38-2

MSDP Benefits

38-3

Configuring MSDP

38-4

Default MSDP Configuration

38-4

Configuring a Default MSDP Peer

38-4

Caching Source-Active State

38-6

Requesting Source Information from an MSDP Peer

38-8

Controlling Source Information that Your Switch Originates

38-9

(32)

Redistributing Sources

38-9

Filtering Source-Active Request Messages

38-11

Controlling Source Information that Your Switch Forwards

38-12

Using a Filter

38-12

Using TTL to Limit the Multicast Data Sent in SA Messages

38-14

Controlling Source Information that Your Switch Receives

38-14

Configuring an MSDP Mesh Group

38-16

Shutting Down an MSDP Peer

38-16

Including a Bordering PIM Dense-Mode Region in MSDP

38-17

Configuring an Originating Address other than the RP Address

38-18

Monitoring and Maintaining MSDP

38-19

C H A P T E R 39 Configuring Fallback Bridging 39-1

Understanding Fallback Bridging

39-1

Configuring Fallback Bridging

39-3

Default Fallback Bridging Configuration

39-3

Fallback Bridging Configuration Guidelines

39-3

Creating a Bridge Group

39-4

Adjusting Spanning-Tree Parameters

39-5

Changing the VLAN-Bridge Spanning-Tree Priority

39-6

Changing the Interface Priority

39-6

Assigning a Path Cost

39-7

Adjusting BPDU Intervals

39-8

Disabling the Spanning Tree on an Interface

39-10

Monitoring and Maintaining Fallback Bridging

39-10

C H A P T E R 40 Troubleshooting 40-1

Recovering from a Software Failure

40-2

Recovering from a Lost or Forgotten Password

40-3

Procedure with Password Recovery Enabled

40-4

Procedure with Password Recovery Disabled

40-6

Recovering from a Command Switch Failure

40-7

Replacing a Failed Command Switch with a Cluster Member

40-8

Replacing a Failed Command Switch with Another Switch

40-10

Recovering from Lost Cluster Member Connectivity

40-11

Preventing Autonegotiation Mismatches

40-11

(33)

Contents

Troubleshooting Power over Ethernet Switch Ports

40-12

Disabled Port Caused by Power Loss

40-12

Disabled Port Caused by False Link Up

40-12

SFP Module Security and Identification

40-12

Monitoring SFP Module Status

40-13

Monitoring Temperature

40-13

Using Ping

40-13

Understanding Ping

40-13

Executing Ping

40-14

Using Layer 2 Traceroute

40-15

Understanding Layer 2 Traceroute

40-15

Usage Guidelines

40-15

Displaying the Physical Path

40-16

Using IP Traceroute

40-16

Understanding IP Traceroute

40-16

Executing IP Traceroute

40-17

Using TDR

40-18

Understanding TDR

40-18

Running TDR and Displaying the Results

40-19

Using Debug Commands

40-19

Enabling Debugging on a Specific Feature

40-19

Enabling All-System Diagnostics

40-20

Redirecting Debug and Error Message Output

40-20

Using the show platform forward Command

40-21

Using the crashinfo File

40-23

A P P E N D I X A Supported MIBs A-1

MIB List

A-1

Using FTP to Access the MIB Files

A-3

A P P E N D I X B Working with the Cisco IOS File System, Configuration Files, and Software Images B-1

Working with the Flash File System

B-1

Displaying Available File Systems

B-2

Setting the Default File System

B-3

Displaying Information about Files on a File System

B-3

Changing Directories and Displaying the Working Directory

B-3

Creating and Removing Directories

B-4

Copying Files

B-4

Références

Documents relatifs

Note In the Kerberos configuration examples and in the Cisco IOS Security Command Reference, Release 12.2, the trusted third party can be a Catalyst 3550 switch that supports

This document provides a sample configuration of IEEE 802.1Q (dot1q) trunking between a Cisco Catalyst 3550/3560/3750 switch that runs Cisco IOS® Software and a Catalyst

Since DHCP client messages use the destination IP address of 255.255.255.255 (all Nets Broadcast), DHCP clients will not be able to send requests to a DHCP server on a

The Catalyst 3560 switch—also referred to as the switch—is an Ethernet switch to which you can connect devices like Cisco Wireless Access Point workstations, Cisco IP Phones, and

Beginning in privileged EXEC mode, follow these steps to enable RADIUS accounting for each Cisco IOS privilege level and for network services:. To disable accounting, use the no

This release note describes the features and modiÞcations of the Catalyst 1200 series switch for software release 4.26 and also contains applicable caveats and workarounds.. Refer

(You must also configure port security on the port by using the switchport port-security interface configuration command.) When you enable port security and IEEE 802.1x on a port,

Use this procedure for upgrading your Catalyst 2950 LRE or Catalyst 2940 switch by using the archive download-sw privileged EXEC command to automatically extract and download the