Cisco Systems 3130 User Manual

Product codes
Page of 1226
 
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706 
USA
http://www.cisco.com
Tel: 408 
526-4000
800 553-NETS (6387)
Fax: 408 
527-0883
Cisco Catalyst Blade Switch 3130 for Dell 
Software Configuration Guide
Cisco IOS Release 12.2(40)EX1
December 2007
Text Part Number: OL-13270-01

Summary of Contents of user manual for Cisco Systems 3130

  • Page 1: Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide

    Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide Cisco IOS Release 12.2(40)EX1 December 2007 Americas Headquarters Cisco Systems,...

  • Page 2

    THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND...

  • Page 3: Contents

    C O N T E N T S Preface xliii Audience xliii Purpose xliii Conventions xliii Related Publications xliv...

  • Page 4

    Contents Using Command History 2-6 Changing the Command History Buffer Size 2-6 Recalling Commands 2-6 Disabling the Command History...

  • Page 5

    Contents CHAPTER 4 Configuring Cisco IOS CNS Agents 4-1 Understanding Cisco Configuration Engine Software 4-1 Configuration Service 4-2 Event...

  • Page 6

    Contents Minor Version Number Incompatibility Among Switches 5-12 Understanding Auto-Upgrade and Auto-Advise 5-13 Auto-Upgrade and Auto-Advise Example Messages 5-14...

  • Page 7

    Contents Configuring a System Name and Prompt 6-14 Default System Name and Prompt Configuration 6-15 Configuring a System Name...

  • Page 8

    Contents Controlling Switch Access with TACACS+ 7-10 Understanding TACACS+ 7-10 TACACS+ Operation 7-12 Configuring TACACS+ 7-12 Default TACACS+ Configuration 7-13...

  • Page 9

    Contents Configuring SSH 7-39 Configuration Guidelines 7-39 Setting Up the Switch to Run SSH 7-40 Configuring the SSH Server...

  • Page 10

    Contents Using IEEE 802.1x Authentication with VLAN Assignment 9-10 Using IEEE 802.1x Authentication with Per-User ACLs 9-12 Using IEEE 802.1x...

  • Page 11

    Contents CHAPTER 10 Configuring Interface Characteristics 10-1 Understanding Interface Types 10-1 Port-Based VLANs 10-2 Switch Ports 10-2 Access Ports...

  • Page 12

    Contents CHAPTER 11 Configuring Smartports Macros 11-1 Understanding Smartports Macros 11-1 Configuring Smartports Macros 11-2 Default Smartports Macro Configuration...

  • Page 13

    Contents Configuring an Ethernet Interface as a Trunk Port 12-20 Interaction with Other Features 12-20 Configuring a Trunk Port...

  • Page 14

    Contents VTP Configuration Guidelines 13-8 Domain Names 13-8 Passwords 13-8 VTP Version 13-9 Configuration Requirements 13-9 Configuring a VTP...

  • Page 15

    Contents Private-VLAN Configuration Guidelines 15-7 Secondary and Primary VLAN Configuration 15-7 Private-VLAN Port Configuration 15-8 Limitations with Other Features...

  • Page 16

    Contents Spanning-Tree Interface States 17-5 Blocking State 17-6 Listening State 17-7 Learning State 17-7 Forwarding State 17-7 Disabled State...

  • Page 17

    Contents IST, CIST, and CST 18-3 Operations Within an MST Region 18-3 Operations Between MST Regions 18-4 IEEE 802.1s...

  • Page 18

    Contents CHAPTER 19 Configuring Optional Spanning-Tree Features 19-1 Understanding Optional Spanning-Tree Features 19-1 Understanding Port Fast 19-2 Understanding BPDU...

  • Page 19

    Contents Configuring Flex Links and MAC Address-Table Move Update 20-6 Configuring Flex Links 20-6 Configuring VLAN Load Balancing on...

  • Page 20

    Contents CHAPTER 22 Configuring Dynamic ARP Inspection 22-1 Understanding Dynamic ARP Inspection 22-1 Interface Trust States and Network Security...

  • Page 21

    Contents Displaying IGMP Snooping Information 23-16 Understanding Multicast VLAN Registration 23-18 Using MVR in a Multicast Television Application 23-19...

  • Page 22

    Contents CHAPTER 25 Configuring Port-Based Traffic Control 25-1 Configuring Storm Control 25-1 Understanding Storm Control 25-1 Default Storm Control...

  • Page 23

    Contents Configuring LLDP and LLDP-MED 27-3 Default LLDP Configuration 27-3 Configuring LLDP Characteristics 27-4 Disabling and Enabling LLDP Globally...

  • Page 24

    Contents Creating a Local SPAN Session and Configuring Incoming Traffic 29-14 Specifying VLANs to Filter 29-15 Configuring RSPAN 29-16...

  • Page 25

    Contents CHAPTER 32 Configuring SNMP 32-1 Understanding SNMP 32-1 SNMP Versions 32-2 SNMP Manager Functions 32-3 SNMP Agent Functions...

  • Page 26

    Contents Handling Fragmented and Unfragmented Traffic 34-5 ACLs and Switch Stacks 34-6 Configuring IPv4 ACLs 34-7 Creating Standard and Extended...

  • Page 27

    Contents CHAPTER 35 Configuring IPv6 ACLs 35-1 Understanding IPv6 ACLs 35-2 Supported ACL Features 35-3 IPv6 ACL Limitations 35-3...

  • Page 28

    Contents Configuring Standard QoS 36-29 Default Standard QoS Configuration 36-30 Default Ingress Queue Configuration 36-30 Default Egress Queue Configuration...

  • Page 29

    Contents Configuring SRR Shared Weights on Egress Queues 36-76 Configuring the Egress Expedite Queue 36-76 Limiting the Bandwidth on...

  • Page 30

    Contents CHAPTER 38 Configuring IP Unicast Routing 38-1 Understanding IP Routing 38-2 Types of Routing 38-2 IP Routing and...

  • Page 31

    Contents Configuring a Loopback Interface 38-35 Monitoring OSPF 38-36 Configuring EIGRP 38-36 Default EIGRP Configuration 38-38 EIGRP Nonstop Forwarding...

  • Page 32

    Contents User Interface for uRPF 38-72 User Interface for Syslog 38-72 User Interface for Traceroute 38-73 User Interface for...

  • Page 33

    Contents Unsupported IPv6 Unicast Routing Features 39-9 Limitations 39-9 IPv6 and Switch Stacks 39-10 SDM Templates 39-11 Dual IPv4-and...

  • Page 34

    Contents Configuring IP SLAs Operations 41-6 Default Configuration 41-6 Configuration Guidelines 41-6 Configuring the IP SLAs Responder 41-8 Analyzing...

  • Page 35

    Contents CHAPTER 44 Configuring IP Multicast Routing 44-1 Understanding Cisco’s Implementation of IP Multicast Routing 44-2 Understanding IGMP 44-3...

  • Page 36

    Contents Controlling Access to IP Multicast Groups 44-32 Changing the IGMP Version 44-33 Modifying the IGMP Host-Query Message Interval...

  • Page 37

    Contents Requesting Source Information from an MSDP Peer 45-8 Controlling Source Information that Your Switch Originates 45-9 Redistributing Sources...

  • Page 38

    Contents Monitoring SFP Module Status 47-10 Monitoring Temperature 47-10 Using Ping 47-10 Understanding Ping 47-10 Executing Ping 47-11 Using...

  • Page 39

    Contents APPENDIX A Supported MIBs A-1 MIB List A-1 Using FTP to Access the MIB Files A-4 APPENDIX B...

  • Page 40

    Contents Image Location on the Switch B-25 File Format of Images on a Server or Cisco.com B-25 Copying Image...

  • Page 41

    Contents HSRP C-5 Unsupported Global Configuration Commands C-5 Unsupported Interface Configuration Commands C-5 IGMP Snooping Commands C-5 Unsupported Global...

  • Page 42

    Contents Unsupported Global Configuration Commands C-12 SNMP C-12 Unsupported Global Configuration Commands C-12 Spanning Tree C-13 Unsupported Global Configuration...

  • Page 43: Preface

    Preface Audience This guide is for the networking professional managing the standalone Cisco Catalyst Blade Switch 3130 for Dell...

  • Page 44

    Preface Related Publications • Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative...

  • Page 45

    Preface Obtaining Documentation and Submitting a Service Request • Cisco Catalyst Blade Switch3130 for Dell System Message Guide (not...

  • Page 46

    Preface Obtaining Documentation and Submitting a Service Request Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide xlvi...

  • Page 47: Overview

    CH A P T E R 1 Overview This chapter provides these topics about the switch software: • Features,...

  • Page 48

    Chapter 1 Overview Features The switch supports one of these feature sets: • IP base feature set, which provides...

  • Page 49

    Chapter 1 Overview Features Deployment Features The switch ships with these features: • Express Setup for quickly configuring a switch...

  • Page 50

    Chapter 1 Overview Features – Provisioning a new member for a switch stack with the offline configuration feature. You...

  • Page 51

    Chapter 1 Overview Features • IIGMP Helper to allow the switch to forward a host request to join a multicast...

  • Page 52

    Chapter 1 Overview Features • Chassis management controller (CMC) GUI—The internal Ethernet management port (also referred to as the...

  • Page 53

    Chapter 1 Overview Features • Out-of-band management access through the switch console port to a directly attached terminal or to...

  • Page 54

    Chapter 1 Overview Features – Root guard for preventing switches outside the network core from becoming the spanning-tree root...

  • Page 55

    Chapter 1 Overview Features Security Features The switch ships with these security features: • Web authentication to allow a supplicant...

  • Page 56

    Chapter 1 Overview Features – Voice VLAN to permit a Cisco IP Phone to access the voice VLAN regardless...

  • Page 57

    Chapter 1 Overview Features • Classification – IP type-of-service/Differentiated Services Code Point (IP ToS/DSCP) and IEEE 802.1p CoS marking priorities...

  • Page 58

    Chapter 1 Overview Features Layer 3 Features These are the Layer 3 features: Note Some features noted in this...

  • Page 59

    Chapter 1 Overview Features • Nonstop forwarding (NSF) awareness to enable the Layer 3 switch to continue forwarding packets from...

  • Page 60

    Chapter 1 Overview Default Settings After Initial Switch Configuration Default Settings After Initial Switch Configuration The switch is designed...

  • Page 61

    Chapter 1 Overview Default Settings After Initial Switch Configuration – Auto-MDIX is enabled. For more information, see Chapter 10, “Configuring...

  • Page 62

    Chapter 1 Overview Network Configuration Examples – Unicast and multicast traffic flooding is not blocked. For more information, see...

  • Page 63

    Chapter 1 Overview Network Configuration Examples Table 1-1 Increasing Network Performance Network Demands Suggested Design Methods Too many users...

  • Page 64

    Chapter 1 Overview Network Configuration Examples Table 1-2 Providing Network Services (continued) Network Demands Suggested Design Methods An evolving...

  • Page 65

    Chapter 1 Overview Network Configuration Examples QoS and policing on the switches provide preferential treatment for certain data streams....

  • Page 66

    Chapter 1 Overview Where to Go Next When an end station in one VLAN needs to communicate with an...

  • Page 67: Using the Command-Line Interface

    CH A P T E R 2 Using the Command-Line Interface This chapter describes the Cisco IOS command-line interface...

  • Page 68

    Chapter 2 Using the Command-Line Interface Understanding Command Modes Table 2-1 describes the main command modes, how to access...

  • Page 69

    Chapter 2 Using the Command-Line Interface Understanding the Help System Table 2-1 Command Mode Summary (continued) Mode Access Method...

  • Page 70

    Chapter 2 Using the Command-Line Interface Understanding Abbreviated Commands Table 2-2 Help Summary (continued) Command Purpose ? List all...

  • Page 71

    Chapter 2 Using the Command-Line Interface Understanding CLI Error Messages Understanding CLI Error Messages Table 2-3 lists some error...

  • Page 72

    Chapter 2 Using the Command-Line Interface Using Command History Using Command History The software provides a history or record...

  • Page 73

    Chapter 2 Using the Command-Line Interface Using Editing Features Disabling the Command History Feature The command history feature is automatically...

  • Page 74

    Chapter 2 Using the Command-Line Interface Using Editing Features Editing Commands through Keystrokes Table 2-5 shows the keystrokes that...

  • Page 75

    Chapter 2 Using the Command-Line Interface Using Editing Features Table 2-5 Editing Commands through Keystrokes (continued) Capability Keystroke1 Purpose...

  • Page 76

    Chapter 2 Using the Command-Line Interface Searching and Filtering Output of show and more Commands Use line wrapping with...

  • Page 77

    Chapter 2 Using the Command-Line Interface Accessing the CLI Accessing the CLI through a Console Connection or through Telnet Before...

  • Page 78

    Chapter 2 Using the Command-Line Interface Accessing the CLI Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide...

  • Page 79: Assigning the Switch IP Address and Default Gateway

    CH A P T E R 3 Assigning the Switch IP Address and Default Gateway This chapter describes how...

  • Page 80

    Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information The normal boot process involves the...

  • Page 81

    Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information Note Stack members retain their IP address...

  • Page 82

    Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information With DHCP-based autoconfiguration, no DHCP client-side...

  • Page 83

    Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information The DHCP server sends the client a...

  • Page 84

    Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information If you do not configure the...

  • Page 85

    Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information Configuring the Relay Device You must configure...

  • Page 86

    Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information • The IP address and the...

  • Page 87

    Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information Table 3-2 shows the configuration of...

  • Page 88

    Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information Switches B through D retrieve their...

  • Page 89

    Chapter 3 Assigning the Switch IP Address and Default Gateway Checking and Saving the Running Configuration By default, VLAN 1...

  • Page 90

    Chapter 3 Assigning the Switch IP Address and Default Gateway Modifying the Startup Configuration This command saves the configuration...

  • Page 91

    Chapter 3 Assigning the Switch IP Address and Default Gateway Modifying the Startup Configuration Specifying the Filename to Read and...

  • Page 92

    Chapter 3 Assigning the Switch IP Address and Default Gateway Modifying the Startup Configuration Command Purpose Step 4 show...

  • Page 93

    Chapter 3 Assigning the Switch IP Address and Default Gateway Modifying the Startup Configuration Command Purpose Step 5 show boot...

  • Page 94

    Chapter 3 Assigning the Switch IP Address and Default Gateway Modifying the Startup Configuration Table 3-4 describes the function...

  • Page 95

    Chapter 3 Assigning the Switch IP Address and Default Gateway Scheduling a Reload of the Software Image When the switch...

  • Page 96

    Chapter 3 Assigning the Switch IP Address and Default Gateway Scheduling a Reload of the Software Image Note Use...

  • Page 97: Configuring Cisco IOS CNS Agents

    CH A P T E R 4 Configuring Cisco IOS CNS Agents This chapter describes how to configure the...

  • Page 98

    Chapter 4 Configuring Cisco IOS CNS Agents Understanding Cisco Configuration Engine Software Figure 4-1 Configuration Engine Architectural Overview Service...

  • Page 99

    Chapter 4 Configuring Cisco IOS CNS Agents Understanding Cisco Configuration Engine Software Event Service The Configuration Engine uses the Event...

  • Page 100

    Chapter 4 Configuring Cisco IOS CNS Agents Understanding Cisco Configuration Engine Software DeviceID Each configured switch participating on the...

  • Page 101

    Chapter 4 Configuring Cisco IOS CNS Agents Understanding Cisco IOS Agents Understanding Cisco IOS Agents The CNS event agent feature...

  • Page 102

    Chapter 4 Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents Incremental (Partial) Configuration After the network is running,...

  • Page 103

    Chapter 4 Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents Table 4-1 Prerequisites for Enabling Automatic Configuration Device Required...

  • Page 104

    Chapter 4 Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents Enabling the CNS Event Agent Note You must...

  • Page 105

    Chapter 4 Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents Enabling the Cisco IOS CNS Agent After enabling the...

  • Page 106

    Chapter 4 Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents Command Purpose Step 7 discover {controller controller-type |...

  • Page 107

    Chapter 4 Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents Command Purpose Step 13 cns id interface num {dns-reverse...

  • Page 108

    Chapter 4 Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents Command Purpose Step 14 cns config initial {hostname...

  • Page 109

    Chapter 4 Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents This example shows how to configure an initial configuration...

  • Page 110

    Chapter 4 Configuring Cisco IOS CNS Agents Displaying CNS Configuration Displaying CNS Configuration You can use the privileged EXEC...

  • Page 111: Managing Switch Stacks

    CH A P T E R 5 Managing Switch Stacks This chapter provides the concepts and procedures to manage...

  • Page 112

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks All stack members are eligible to be stack masters. If the...

  • Page 113

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks – Switch Stack Management Connectivity, page 5-17 – Switch Stack Configuration Scenarios,...

  • Page 114

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Figure 5-1 Creating a Switch Stack from Two Standalone Switches in...

  • Page 115

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Figure 5-2 Creating a Switch Stack from Two Standalone Switches in the...

  • Page 116

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Figure 5-3 Adding a Standalone Switch to a Switch Stack Enclosure...

  • Page 117

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks 4. The switch with the higher priority feature set and software image...

  • Page 118

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Switch Stack Bridge ID and Router MAC Address The bridge ID...

  • Page 119

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Stack Member Priority Values A higher priority value for a stack member...

  • Page 120

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Table 5-1 Results of Comparing the Provisioned Configuration with the Provisioned...

  • Page 121

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks If you add a provisioned switch that is a different type than...

  • Page 122

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks All stack members must run the same Cisco IOS software image...

  • Page 123

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Understanding Auto-Upgrade and Auto-Advise When the software detects mismatched software and tries...

  • Page 124

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks You can use the archive-download-sw /allow-feature-upgrade privileged EXEC command to allow...

  • Page 125

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks *Mar 11 20:36:15.038:%IMAGEMGR-6-AUTO_COPY_SW:extracting cbs31x0-universal-mz.122-0.0.313.EX1/cbs31x0-universal-mz.122-40.EX1 (4945851 bytes) *Mar 11 20:36:15.038:%IMAGEMGR-6-AUTO_COPY_SW:extracting cbs31x0-universal-mz.122-40.EX1/info (450 bytes)...

  • Page 126

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Note Auto-advise and auto-copy identify which images are running by examining...

  • Page 127

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks You back up and restore the stack configuration in the same way...

  • Page 128

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Connectivity to the Switch Stack Through an IP Address The switch...

  • Page 129

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Switch Stack Configuration Scenarios Table 5-2 provides switch stack configuration scenarios....

  • Page 130

    Chapter 5 Managing Switch Stacks Understanding Switch Stacks Table 5-2 Switch Stack Configuration Scenarios (continued) Scenario Result Stack master...

  • Page 131

    Chapter 5 Managing Switch Stacks Configuring the Switch Stack Configuring the Switch Stack These sections contain this configuration information: •...

  • Page 132

    Chapter 5 Managing Switch Stacks Configuring the Switch Stack • If you enter a time delay of 1 to...

  • Page 133

    Chapter 5 Managing Switch Stacks Configuring the Switch Stack WARNING: not appear elsewhere in this network domain. If it does,...

  • Page 134

    Chapter 5 Managing Switch Stacks Configuring the Switch Stack Beginning in privileged EXEC mode, follow these steps to assign...

  • Page 135

    Chapter 5 Managing Switch Stacks Accessing the CLI of a Specific Stack Member To remove provisioned information and to avoid...

  • Page 136

    Chapter 5 Managing Switch Stacks Displaying Switch Stack Information Table 5-4 Commands for Displaying Switch Stack Information Command Description...

  • Page 137: Administering the Switch

    CH A P T E R 6 Administering the Switch This chapter describes how to perform one-time operations to...

  • Page 138

    Chapter 6 Administering the Switch Managing the System Time and Date The system clock can provide time to these...

  • Page 139

    Chapter 6 Administering the Switch Managing the System Time and Date Figure 6-1 shows a typical network example using NTP....

  • Page 140

    Chapter 6 Administering the Switch Managing the System Time and Date These sections contain this configuration information: • Default...

  • Page 141

    Chapter 6 Administering the Switch Managing the System Time and Date Command Purpose Step 3 ntp authentication-key number md5 value...

  • Page 142

    Chapter 6 Administering the Switch Managing the System Time and Date Beginning in privileged EXEC mode, follow these steps...

  • Page 143

    Chapter 6 Administering the Switch Managing the System Time and Date The switch can send or receive NTP broadcast packets...

  • Page 144

    Chapter 6 Administering the Switch Managing the System Time and Date Command Purpose Step 5 ntp broadcastdelay microseconds (Optional)...

  • Page 145

    Chapter 6 Administering the Switch Managing the System Time and Date Command Purpose Step 3 access-list access-list-number permit Create the...

  • Page 146

    Chapter 6 Administering the Switch Managing the System Time and Date Disabling NTP Services on a Specific Interface NTP...

  • Page 147

    Chapter 6 Administering the Switch Managing the System Time and Date Displaying the NTP Configuration You can use two privileged...

  • Page 148

    Chapter 6 Administering the Switch Managing the System Time and Date Displaying the Time and Date Configuration To display...

  • Page 149

    Chapter 6 Administering the Switch Managing the System Time and Date Configuring Summer Time (Daylight Saving Time) Beginning in privileged...

  • Page 150

    Chapter 6 Administering the Switch Configuring a System Name and Prompt Beginning in privileged EXEC mode, follow these steps...

  • Page 151

    Chapter 6 Administering the Switch Configuring a System Name and Prompt For complete syntax and usage information for the commands...

  • Page 152

    Chapter 6 Administering the Switch Configuring a System Name and Prompt To keep track of domain names, IP has...

  • Page 153

    Chapter 6 Administering the Switch Creating a Banner Command Purpose Step 5 end Return to privileged EXEC mode. Step 6...

  • Page 154

    Chapter 6 Administering the Switch Creating a Banner Configuring a Message-of-the-Day Login Banner You can create a single or...

  • Page 155

    Chapter 6 Administering the Switch Managing the MAC Address Table Configuring a Login Banner You can configure a login banner...

  • Page 156

    Chapter 6 Administering the Switch Managing the MAC Address Table These sections contain this configuration information: • Building the...

  • Page 157

    Chapter 6 Administering the Switch Managing the MAC Address Table When private VLANs are configured, address learning depends on the...

  • Page 158

    Chapter 6 Administering the Switch Managing the MAC Address Table Beginning in privileged EXEC mode, follow these steps to...

  • Page 159

    Chapter 6 Administering the Switch Managing the MAC Address Table Beginning in privileged EXEC mode, follow these steps to configure...

  • Page 160

    Chapter 6 Administering the Switch Managing the MAC Address Table Command Purpose Step 9 show mac address-table notification interface...

  • Page 161

    Chapter 6 Administering the Switch Managing the MAC Address Table Beginning in privileged EXEC mode, follow these steps to add...

  • Page 162

    Chapter 6 Administering the Switch Managing the MAC Address Table • If you add a unicast MAC address as...

  • Page 163

    Chapter 6 Administering the Switch Managing the ARP Table Displaying Address Table Entries You can display the MAC address...

  • Page 164

    Chapter 6 Administering the Switch Managing the ARP Table Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide...

  • Page 165: Configuring Switch-Based Authentication

    CH A P T E R 7 Configuring Switch-Based Authentication This chapter describes how to configure switch-based authentication on...

  • Page 166

    Chapter 7 Configuring Switch-Based Authentication Protecting Access to Privileged EXEC Commands • If you want to use username and...

  • Page 167

    Chapter 7 Configuring Switch-Based Authentication Protecting Access to Privileged EXEC Commands Setting or Changing a Static Enable Password The enable...

  • Page 168

    Chapter 7 Configuring Switch-Based Authentication Protecting Access to Privileged EXEC Commands Beginning in privileged EXEC mode, follow these steps...

  • Page 169

    Chapter 7 Configuring Switch-Based Authentication Protecting Access to Privileged EXEC Commands This example shows how to configure the encrypted password...

  • Page 170

    Chapter 7 Configuring Switch-Based Authentication Protecting Access to Privileged EXEC Commands Setting a Telnet Password for a Terminal Line...

  • Page 171

    Chapter 7 Configuring Switch-Based Authentication Protecting Access to Privileged EXEC Commands Beginning in privileged EXEC mode, follow these steps to...

  • Page 172

    Chapter 7 Configuring Switch-Based Authentication Protecting Access to Privileged EXEC Commands Setting the Privilege Level for a Command Beginning...

  • Page 173

    Chapter 7 Configuring Switch-Based Authentication Protecting Access to Privileged EXEC Commands Changing the Default Privilege Level for Lines Beginning in...

  • Page 174

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with TACACS+ Controlling Switch Access with TACACS+ This section describes how...

  • Page 175

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with TACACS+ Figure 7-1 Typical TACACS+ Network Configuration UNIX workstation (TACACS+ Catalyst...

  • Page 176

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with TACACS+ TACACS+ Operation When a user attempts a simple ASCII...

  • Page 177

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with TACACS+ • Configuring TACACS+ Authorization for Privileged EXEC Access and Network...

  • Page 178

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with TACACS+ Command Purpose Step 6 end Return to privileged EXEC...

  • Page 179

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with TACACS+ Command Purpose Step 3 aaa authentication login {default | Create...

  • Page 180

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with TACACS+ Note To secure the switch for HTTP access by...

  • Page 181

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Starting TACACS+ Accounting The AAA accounting feature tracks the services...

  • Page 182

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Understanding RADIUS RADIUS is a distributed client/server system that...

  • Page 183

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Figure 7-2 Transitioning from RADIUS to TACACS+ Services R1 RADIUS...

  • Page 184

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Configuring RADIUS This section describes how to configure your...

  • Page 185

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS You identify RADIUS security servers by their hostname or IP...

  • Page 186

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Beginning in privileged EXEC mode, follow these steps to...

  • Page 187

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS To remove the specified RADIUS server, use the no radius-server...

  • Page 188

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Command Purpose Step 3 aaa authentication login {default |...

  • Page 189

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS To disable AAA, use the no aaa new-model global configuration...

  • Page 190

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Beginning in privileged EXEC mode, follow these steps to...

  • Page 191

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Command Purpose Step 8 copy running-config startup-config (Optional) Save your...

  • Page 192

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Command Purpose Step 3 aaa authorization exec radius Configure...

  • Page 193

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS Configuring Settings for All RADIUS Servers Beginning in privileged EXEC...

  • Page 194

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS This example shows how to provide a user logging...

  • Page 195

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with Kerberos As mentioned earlier, to configure RADIUS (whether vendor-proprietary or IETF...

  • Page 196

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with Kerberos You can download the cryptographic software image from www.dell.com/support...

  • Page 197

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with Kerberos In this software release, Kerberos supports these network services: •...

  • Page 198

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with Kerberos Table 7-2 Kerberos Terms (continued) Term Definition 3 KEYTAB...

  • Page 199

    Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with Kerberos 4. The KDC sends an encrypted TGT that includes the...

  • Page 200

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Local Authentication and Authorization Note A Kerberos server can be...

  • Page 201

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell Command Purpose Step 6 username name [privilege level] Enter...

  • Page 202

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell For SSH configuration examples, see the “SSH Configuration...

  • Page 203

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell SSH also supports these user authentication methods: • TACACS+...

  • Page 204

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell • When generating the RSA key pair, the...

  • Page 205

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell Configuring the SSH Server Beginning in privileged EXEC mode,...

  • Page 206

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Socket Layer HTTP Displaying the SSH Configuration and Status...

  • Page 207

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Socket Layer HTTP The primary role of the HTTP secure...

  • Page 208

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Socket Layer HTTP <output truncated> You can remove this...

  • Page 209

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Socket Layer HTTP Configuring Secure HTTP Servers and Clients These...

  • Page 210

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Socket Layer HTTP Command Purpose Step 5 crypto ca...

  • Page 211

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Socket Layer HTTP Command Purpose Step 4 ip http secure-port...

  • Page 212

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Socket Layer HTTP To verify the secure HTTP connection...

  • Page 213

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Copy Protocol Displaying Secure HTTP Server and Client Status To...

  • Page 214

    Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Copy Protocol Cisco Catalyst Blade Switch 3130 for Dell...

  • Page 215: Configuring SDM Templates

    CH A P T E R 8 Configuring SDM Templates This chapter describes how to configure the Switch Database...

  • Page 216

    Chapter 8 Configuring SDM Templates Understanding the SDM Templates Table 8-1 Approximate Number of Feature Resources Allowed by Each...

  • Page 217

    Chapter 8 Configuring SDM Templates Understanding the SDM Templates Table 8-2 Approximate Feature Resources Allowed by Dual IPv4-IPv6 Templates IPv4-and-IPv6...

  • Page 218

    Chapter 8 Configuring SDM Templates Configuring the Switch SDM Template 2d23h:%SDM-6-MISMATCH_ADVISE:compatible desktop SDM template: 2d23h:%SDM-6-MISMATCH_ADVISE: 2d23h:%SDM-6-MISMATCH_ADVISE: "sdm prefer vlan...

  • Page 219

    Chapter 8 Configuring SDM Templates Configuring the Switch SDM Template Setting the SDM Template Beginning in privileged EXEC mode, follow...

  • Page 220

    Chapter 8 Configuring SDM Templates Displaying the SDM Templates On next reload, template will be “desktop vlan” template. To...

  • Page 221

    Chapter 8 Configuring SDM Templates Displaying the SDM Templates This is an example of output from the show sdm prefer...

  • Page 222

    Chapter 8 Configuring SDM Templates Displaying the SDM Templates Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide...

  • Page 223: Configuring IEEE 802.1x Port-Based Authentication

    CH A P T E R 9 Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE...

  • Page 224

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication • IEEE 802.1x Accounting, page 9-9 •...

  • Page 225

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Authentication Protocol (EAP) extensions is the only supported...

  • Page 226

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Figure 9-2 shows the authentication process. If...

  • Page 227

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication The Session-Timeout RADIUS attribute (Attribute[27]) specifies the time...

  • Page 228

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Figure 9-3 Message Exchange Authentication server Client...

  • Page 229

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Ports in Authorized and Unauthorized States During IEEE...

  • Page 230

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication If IP connectivity to the RADIUS server...

  • Page 231

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Figure 9-5 Multiple Host Mode Example Authentication server...

  • Page 232

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Table 9-1 Accounting AV Pairs (continued) Attribute...

  • Page 233

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Voice device authentication is supported. When a voice...

  • Page 234

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication • Assign vendor-specific tunnel attributes in the...

  • Page 235

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication For examples of vendor-specific attributes, see the “Configuring...

  • Page 236

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Any number of IEEE 802.1x-incapable clients are...

  • Page 237

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication After a port moves to the restricted VLAN,...

  • Page 238

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Inaccessible authentication bypass interacts with these features:...

  • Page 239

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication In single-host mode, only the IP phone is...

  • Page 240

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication • When an IEEE 802.1x client logs...

  • Page 241

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication frame with a username and password based on...

  • Page 242

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication Network Admission Control Layer 2 IEEE 802.1x...

  • Page 243

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Understanding IEEE 802.1x Port-Based Authentication • If more than one device attempts authorization...

  • Page 244

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication For example: proxyacl# 10=permit ip any 10.0.0.0 255.0.0.0...

  • Page 245

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication • Configuring IEEE 802.1x Authentication with WoL, page 9-39...

  • Page 246

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Table 9-2 Default IEEE 802.1x Authentication Configuration (continued)...

  • Page 247

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication • The IEEE 802.1x protocol is supported on Layer...

  • Page 248

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication the IEEE 802.1x authentication process (dot1x timeout quiet-period...

  • Page 249

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Step 4 The switch sends a start message to...

  • Page 250

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Configuring the Switch-to-RADIUS-Server Communication RADIUS security servers are...

  • Page 251

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication You also need to configure some settings on the...

  • Page 252

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Configuring Periodic Re-Authentication You can enable periodic IEEE...

  • Page 253

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Changing the Quiet Period When the switch cannot authenticate...

  • Page 254

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Command Purpose Step 4 end Return to privileged...

  • Page 255

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Setting the Re-Authentication Number You can also change the...

  • Page 256

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Note You must configure the RADIUS server to...

  • Page 257

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Command Purpose Step 3 switchport mode access Set the...

  • Page 258

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Command Purpose Step 4 dot1x port-control auto Enable...

  • Page 259

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication To return to the default value, use the no...

  • Page 260

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Command Purpose Step 4 radius-server host ip-address (Optional)...

  • Page 261

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Command Purpose Step 6 interface interface-id Specify the port...

  • Page 262

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Command Purpose Step 3 dot1x control-direction {both |...

  • Page 263

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Configuring NAC Layer 2 IEEE 802.1x Validation You can...

  • Page 264

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Configuring Web Authentication Beginning in privileged EXEC mode,...

  • Page 265

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Beginning in privileged EXEC mode, follow these steps to...

  • Page 266

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Configuring IEEE 802.1x Authentication Command Purpose Step 9 dot1x port-control auto Enable...

  • Page 267

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Displaying IEEE 802.1x Statistics and Status To configure the port as an IEEE...

  • Page 268

    Chapter 9 Configuring IEEE 802.1x Port-Based Authentication Displaying IEEE 802.1x Statistics and Status Cisco Catalyst Blade Switch 3130 for...

  • Page 269: Configuring Interface Characteristics

    CH A P T E R 10 Configuring Interface Characteristics This chapter defines the types of interfaces on the...

  • Page 270

    Chapter 10 Configuring Interface Characteristics Understanding Interface Types • 10-Gigabit Ethernet Interfaces, page 10-6 • Connecting Interfaces, page 10-6...

  • Page 271

    Chapter 10 Configuring Interface Characteristics Understanding Interface Types Note When you put an interface that is in Layer 3 mode...

  • Page 272

    Chapter 10 Configuring Interface Characteristics Understanding Interface Types traffic is forwarded to and from the trunk port for that...

  • Page 273

    Chapter 10 Configuring Interface Characteristics Understanding Interface Types Switch Virtual Interfaces A switch virtual interface (SVI) represents a VLAN of...

  • Page 274

    Chapter 10 Configuring Interface Characteristics Understanding Interface Types When you configure an EtherChannel, you create a port-channel logical interface...

  • Page 275

    Chapter 10 Configuring Interface Characteristics Using Interface Configuration Mode possible, to maintain high performance, forwarding is done by the switch...

  • Page 276

    Chapter 10 Configuring Interface Characteristics Using Interface Configuration Mode You can identify physical interfaces by physically checking the interface...

  • Page 277

    Chapter 10 Configuring Interface Characteristics Using Interface Configuration Mode Enter the show interfaces privileged EXEC command to see a list...

  • Page 278

    Chapter 10 Configuring Interface Characteristics Using Interface Configuration Mode Note When you use the interface range command with port...

  • Page 279

    Chapter 10 Configuring Interface Characteristics Using Interface Configuration Mode Command Purpose Step 3 interface range macro macro_name Select the interface...

  • Page 280

    Chapter 10 Configuring Interface Characteristics Using the Internal Ethernet Management Port This example shows how to create a multiple-interface...

  • Page 281

    Chapter 10 Configuring Interface Characteristics Using the Internal Ethernet Management Port For a nonstacking-capable switch or a standalone stacking-capable switch,...

  • Page 282

    Chapter 10 Configuring Interface Characteristics Using the Internal Ethernet Management Port Figure 10-3 Connecting a Switch Stack to a...

  • Page 283

    Chapter 10 Configuring Interface Characteristics Using the Internal Ethernet Management Port • Telnet with passwords • TFTP • Secure Shell...

  • Page 284

    Chapter 10 Configuring Interface Characteristics Configuring Ethernet Interfaces TFTP and the Ethernet Management Port Use the commands in Table...

  • Page 285

    Chapter 10 Configuring Interface Characteristics Configuring Ethernet Interfaces Note To configure Layer 2 parameters, if the interface is in Layer...

  • Page 286

    Chapter 10 Configuring Interface Characteristics Configuring Ethernet Interfaces Configuring Interface Speed and Duplex Mode Ethernet interfaces on the switch...

  • Page 287

    Chapter 10 Configuring Interface Characteristics Configuring Ethernet Interfaces Setting the Interface Speed and Duplex Parameters Beginning in privileged EXEC mode,...

  • Page 288

    Chapter 10 Configuring Interface Characteristics Configuring Ethernet Interfaces This example shows how to set the interface speed to 100...

  • Page 289

    Chapter 10 Configuring Interface Characteristics Configuring Ethernet Interfaces To disable flow control, use the flowcontrol receive off interface configuration command....

  • Page 290

    Chapter 10 Configuring Interface Characteristics Configuring Layer 3 Interfaces To disable auto-MDIX, use the no mdix auto interface configuration...

  • Page 291

    Chapter 10 Configuring Interface Characteristics Configuring Layer 3 Interfaces Note When you create an SVI, it does not become active...

  • Page 292

    Chapter 10 Configuring Interface Characteristics Configuring the System MTU Command Purpose Step 6 end Return to privileged EXEC mode....

  • Page 293

    Chapter 10 Configuring Interface Characteristics Configuring the System MTU The upper limit of the system routing MTU value is based...

  • Page 294

    Chapter 10 Configuring Interface Characteristics Monitoring and Maintaining the Interfaces Monitoring and Maintaining the Interfaces These sections contain interface...

  • Page 295

    Chapter 10 Configuring Interface Characteristics Monitoring and Maintaining the Interfaces Clearing and Resetting Interfaces and Counters Table 10-5 lists the...

  • Page 296

    Chapter 10 Configuring Interface Characteristics Monitoring and Maintaining the Interfaces Cisco Catalyst Blade Switch 3130 for Dell Software Configuration...

  • Page 297: Configuring Smartports Macros

    CH A P T E R 11 Configuring Smartports Macros This chapter describes how to configure and apply Smartports...

  • Page 298

    Chapter 11 Configuring Smartports Macros Configuring Smartports Macros Table 11-1 Cisco-Default Smartports Macros (continued) Macro Name1 Description cisco-phone Use...

  • Page 299

    Chapter 11 Configuring Smartports Macros Configuring Smartports Macros Smartports Macro Configuration Guidelines Follow these guidelines when configuring macros on your...

  • Page 300

    Chapter 11 Configuring Smartports Macros Configuring Smartports Macros Follow these guidelines when you apply a Cisco-default Smartports macro on...

  • Page 301

    Chapter 11 Configuring Smartports Macros Configuring Smartports Macros Applying Smartports Macros Beginning in privileged EXEC mode, follow these steps to...

  • Page 302

    Chapter 11 Configuring Smartports Macros Configuring Smartports Macros This example shows how to apply the user-created macro called snmp,...

  • Page 303

    Chapter 11 Configuring Smartports Macros Configuring Smartports Macros Command Purpose Step 7 macro {apply | trace} macro-name Append the Cisco-default...

  • Page 304

    Chapter 11 Configuring Smartports Macros Displaying Smartports Macros Displaying Smartports Macros To display the Smartports macros, use one or...

  • Page 305: Configuring VLANs

    CH A P T E R 12 Configuring VLANs This chapter describes how to configure normal-range VLANs (VLAN IDs...

  • Page 306

    Chapter 12 Configuring VLANs Understanding VLANs Figure 12-1 shows an example of VLANs segmented into logically defined networks. Figure...

  • Page 307

    Chapter 12 Configuring VLANs Understanding VLANs Although the switch or switch stack supports a total of 1005 (normal range and...

  • Page 308

    Chapter 12 Configuring VLANs Configuring Normal-Range VLANs Table 12-1 Port Membership Modes and Characteristics (continued) Membership Mode VLAN Membership...

  • Page 309

    Chapter 12 Configuring VLANs Configuring Normal-Range VLANs Caution You can cause inconsistency in the VLAN database if you attempt to...

  • Page 310

    Chapter 12 Configuring VLANs Configuring Normal-Range VLANs Token Ring VLANs Although the switch does not support Token Ring connections,...

  • Page 311

    Chapter 12 Configuring VLANs Configuring Normal-Range VLANs VLAN Configuration Mode Options You can configure normal-range VLANs (with VLAN IDs 1...

  • Page 312

    Chapter 12 Configuring VLANs Configuring Normal-Range VLANs When you save VLAN and VTP information (including extended-range VLAN configuration information)...

  • Page 313

    Chapter 12 Configuring VLANs Configuring Normal-Range VLANs Creating or Modifying an Ethernet VLAN Each Ethernet VLAN in the VLAN database...

  • Page 314

    Chapter 12 Configuring VLANs Configuring Normal-Range VLANs You can also create or modify Ethernet VLANs by using the VLAN...

  • Page 315

    Chapter 12 Configuring VLANs Configuring Normal-Range VLANs Caution When you delete a VLAN, any ports assigned to that VLAN become...

  • Page 316

    Chapter 12 Configuring VLANs Configuring Extended-Range VLANs Command Purpose Step 7 show interfaces interface-id switchport Verify your entries in...

  • Page 317

    Chapter 12 Configuring VLANs Configuring Extended-Range VLANs Extended-Range VLAN Configuration Guidelines Follow these guidelines when creating extended-range VLANs: • To...

  • Page 318

    Chapter 12 Configuring VLANs Configuring Extended-Range VLANs Creating an Extended-Range VLAN You create an extended-range VLAN in global configuration...

  • Page 319

    Chapter 12 Configuring VLANs Configuring Extended-Range VLANs This example shows how to create a new extended-range VLAN with all default...

  • Page 320

    Chapter 12 Configuring VLANs Displaying VLANs Displaying VLANs Use the show vlan privileged EXEC command to display a list...

  • Page 321

    Chapter 12 Configuring VLANs Configuring VLAN Trunks Figure 12-2 shows a network of switches that are connected by ISL trunks....

  • Page 322

    Chapter 12 Configuring VLANs Configuring VLAN Trunks Ethernet trunk interfaces support different trunking modes (see Table 12-4). You can...

  • Page 323

    Chapter 12 Configuring VLANs Configuring VLAN Trunks Encapsulation Types Table 12-5 lists the Ethernet trunk encapsulation types and keywords. Table...

  • Page 324

    Chapter 12 Configuring VLANs Configuring VLAN Trunks Default Layer 2 Ethernet Interface VLAN Configuration Table 12-6 shows the default...

  • Page 325

    Chapter 12 Configuring VLANs Configuring VLAN Trunks – STP Port Fast setting. – trunk status: if one port in a...

  • Page 326

    Chapter 12 Configuring VLANs Configuring VLAN Trunks To return an interface to its default configuration, use the default interface...

  • Page 327

    Chapter 12 Configuring VLANs Configuring VLAN Trunks Command Purpose Step 4 switchport trunk allowed vlan {add | (Optional) Configure the...

  • Page 328

    Chapter 12 Configuring VLANs Configuring VLAN Trunks Command Purpose Step 5 show interfaces interface-id switchport Verify your entries in...

  • Page 329

    Chapter 12 Configuring VLANs Configuring VLAN Trunks You configure load sharing on trunk ports by using STP port priorities or...

  • Page 330

    Chapter 12 Configuring VLANs Configuring VLAN Trunks Beginning in privileged EXEC mode, follow these steps to configure the network...

  • Page 331

    Chapter 12 Configuring VLANs Configuring VLAN Trunks Load Sharing Using STP Path Cost You can configure parallel trunks to share...

  • Page 332

    Chapter 12 Configuring VLANs Configuring VMPS Command Purpose Step 11 interface gigabitethernet1/0/1 Define the interface on which to set...

  • Page 333

    Chapter 12 Configuring VLANs Configuring VMPS If the port is currently unassigned (that is, it does not yet have a...

  • Page 334

    Chapter 12 Configuring VLANs Configuring VMPS Default VMPS Client Configuration Table 12-7 shows the default VMPS and dynamic-access port...

  • Page 335

    Chapter 12 Configuring VLANs Configuring VMPS Entering the IP Address of the VMPS You must first enter the IP address...

  • Page 336

    Chapter 12 Configuring VLANs Configuring VMPS Command Purpose Step 6 show interfaces interface-id switchport Verify your entries in the...

  • Page 337

    Chapter 12 Configuring VLANs Configuring VMPS Changing the Retry Count Beginning in privileged EXEC mode, follow these steps to change...

  • Page 338

    Chapter 12 Configuring VLANs Configuring VMPS Troubleshooting Dynamic-Access Port VLAN Membership The VMPS shuts down a dynamic-access port under...

  • Page 339

    Chapter 12 Configuring VLANs Configuring VMPS Figure 12-6 Dynamic Port VLAN Membership Configuration TFTP server Catalyst 6500 series switch A...

  • Page 340

    Chapter 12 Configuring VLANs Configuring VMPS Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 12-36 OL-13270-01

  • Page 341: Configuring VTP

    CH A P T E R 13 Configuring VTP This chapter describes how to use the VLAN Trunking Protocol...

  • Page 342

    Chapter 13 Configuring VTP Understanding VTP The switch supports 1005 VLANs, but the number of routed ports, SVIs, and...

  • Page 343

    Chapter 13 Configuring VTP Understanding VTP For domain name and password configuration guidelines, see the “VTP Configuration Guidelines” section on...

  • Page 344

    Chapter 13 Configuring VTP Understanding VTP VTP advertisements distribute this global domain information: • VTP domain name • VTP...

  • Page 345

    Chapter 13 Configuring VTP Understanding VTP VTP pruning blocks unneeded flooded traffic to VLANs on trunk ports that are included...

  • Page 346

    Chapter 13 Configuring VTP Configuring VTP Enabling VTP pruning on a VTP server enables pruning for the entire management...

  • Page 347

    Chapter 13 Configuring VTP Configuring VTP Default VTP Configuration Table 13-2 shows the default VTP configuration. Table 13-2 Default VTP...

  • Page 348

    Chapter 13 Configuring VTP Configuring VTP VTP Configuration in VLAN Database Configuration Mode You can configure all VTP parameters...

  • Page 349

    Chapter 13 Configuring VTP Configuring VTP VTP Version Follow these guidelines when deciding which VTP version to implement: • All...

  • Page 350

    Chapter 13 Configuring VTP Configuring VTP Command Purpose Step 4 vtp password password (Optional) Set the password for the...

  • Page 351

    Chapter 13 Configuring VTP Configuring VTP This example shows how to use VLAN database configuration mode to configure the switch...

  • Page 352

    Chapter 13 Configuring VTP Configuring VTP Use the no vtp mode global configuration command to return the switch to...

  • Page 353

    Chapter 13 Configuring VTP Configuring VTP Note You can also configure VTP transparent mode by using the vlan database privileged...

  • Page 354

    Chapter 13 Configuring VTP Configuring VTP Enabling VTP Pruning Pruning increases available bandwidth by restricting flooded traffic to those...

  • Page 355

    Chapter 13 Configuring VTP Configuring VTP Beginning in privileged EXEC mode, follow these steps to verify and reset the VTP...

  • Page 356

    Chapter 13 Configuring VTP Monitoring VTP Monitoring VTP You monitor VTP by displaying VTP configuration information: the domain name,...

  • Page 357: Configuring Voice VLAN

    CH A P T E R 14 Configuring Voice VLAN This chapter describes how to configure the voice VLAN...

  • Page 358

    Chapter 14 Configuring Voice VLAN Understanding Voice VLAN Figure 14-1 shows one way to connect a Cisco 7960 IP...

  • Page 359

    Chapter 14 Configuring Voice VLAN Configuring Voice VLAN Note Untagged traffic from the device attached to the Cisco IP Phone...

  • Page 360

    Chapter 14 Configuring Voice VLAN Configuring Voice VLAN • If the Cisco IP Phone and a device attached to...

  • Page 361

    Chapter 14 Configuring Voice VLAN Configuring Voice VLAN Configuring Cisco IP Phone Voice Traffic You can configure a port connected...

  • Page 362

    Chapter 14 Configuring Voice VLAN Configuring Voice VLAN This example shows how to configure a port connected to a...

  • Page 363

    Chapter 14 Configuring Voice VLAN Displaying Voice VLAN Command Purpose Step 3 switchport priority extend Set the priority of data...

  • Page 364

    Chapter 14 Configuring Voice VLAN Displaying Voice VLAN Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 14-8...

  • Page 365: Configuring Private VLANs

    CH A P T E R 15 Configuring Private VLANs This chapter describes how to configure private VLANs on...

  • Page 366

    Chapter 15 Configuring Private VLANs Understanding Private VLANs Figure 15-1 Private-VLAN Domain Primary VLAN Private VLAN domain Subdomain Subdomain...

  • Page 367

    Chapter 15 Configuring Private VLANs Understanding Private VLANs Primary and secondary VLANs have these characteristics: • Primary VLAN—A private VLAN...

  • Page 368

    Chapter 15 Configuring Private VLANs Understanding Private VLANs Private VLANs across Multiple Switches As with regular VLANs, private VLANs...

  • Page 369

    Chapter 15 Configuring Private VLANs Understanding Private VLANs You should also see the “Secondary and Primary VLAN Configuration” section on...

  • Page 370

    Chapter 15 Configuring Private VLANs Configuring Private VLANs • If two stacks merge, private VLANs on the winning stack...

  • Page 371

    Chapter 15 Configuring Private VLANs Configuring Private VLANs Private-VLAN Configuration Guidelines Guidelines for configuring private VLANs fall into these categories:...

  • Page 372

    Chapter 15 Configuring Private VLANs Configuring Private VLANs Connecting a device with a different MAC address but with the...

  • Page 373

    Chapter 15 Configuring Private VLANs Configuring Private VLANs Limitations with Other Features When configuring private VLANs, remember these limitations with...

  • Page 374

    Chapter 15 Configuring Private VLANs Configuring Private VLANs Configuring and Associating VLANs in a Private VLAN Beginning in privileged...

  • Page 375

    Chapter 15 Configuring Private VLANs Configuring Private VLANs When you associate secondary VLANs with a primary VLAN, note this syntax...

  • Page 376

    Chapter 15 Configuring Private VLANs Configuring Private VLANs Command Purpose Step 3 switchport mode private-vlan host Configure the Layer...

  • Page 377

    Chapter 15 Configuring Private VLANs Configuring Private VLANs Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port Beginning in...

  • Page 378

    Chapter 15 Configuring Private VLANs Configuring Private VLANs Mapping Secondary VLANs to a Primary VLAN Layer 3 VLAN Interface...

  • Page 379

    Chapter 15 Configuring Private VLANs Monitoring Private VLANs Monitoring Private VLANs Table 15-1 shows the privileged EXEC commands for monitoring...

  • Page 380

    Chapter 15 Configuring Private VLANs Monitoring Private VLANs Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 15-16...

  • Page 381: Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling

    CH A P T E R 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs)...

  • Page 382

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Understanding IEEE 802.1Q Tunneling Customer traffic tagged in the...

  • Page 383

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Understanding IEEE 802.1Q Tunneling Figure 16-2 Original (Normal), IEEE 802.1Q,...

  • Page 384

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring IEEE 802.1Q Tunneling Configuring IEEE 802.1Q Tunneling These...

  • Page 385

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring IEEE 802.1Q Tunneling These are some ways to solve...

  • Page 386

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring IEEE 802.1Q Tunneling IEEE 802.1Q Tunneling and Other...

  • Page 387

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Understanding Layer 2 Protocol Tunneling Command Purpose Step 5 exit...

  • Page 388

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Understanding Layer 2 Protocol Tunneling as normal packets. Layer...

  • Page 389

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Understanding Layer 2 Protocol Tunneling Figure 16-4 Layer 2 Protocol...

  • Page 390

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 Protocol Tunneling For example, in Figure...

  • Page 391

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 Protocol Tunneling See Figure 16-4, with Customer...

  • Page 392

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 Protocol Tunneling Layer 2 Protocol Tunneling...

  • Page 393

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 Protocol Tunneling Configuring Layer 2 Protocol Tunneling...

  • Page 394

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 Protocol Tunneling Use the no l2protocol-tunnel...

  • Page 395

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 Protocol Tunneling Command Purpose Step 5 l2protocol-tunnel...

  • Page 396

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 Protocol Tunneling Configuring the Customer Switch...

  • Page 397

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 Protocol Tunneling Switch(config-if)# l2protocol-tunnel drop-threshold point-to-point pagp...

  • Page 398

    Chapter 16 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Monitoring and Maintaining Tunneling Status Monitoring and Maintaining Tunneling...

  • Page 399: Configuring STP

    CH A P T E R 17 Configuring STP This chapter describes how to configure the Spanning Tree Protocol...

  • Page 400

    Chapter 17 Configuring STP Understanding Spanning-Tree Features • Supported Spanning-Tree Instances, page 17-10 • Spanning-Tree Interoperability and Backward Compatibility,...

  • Page 401

    Chapter 17 Configuring STP Understanding Spanning-Tree Features Spanning-Tree Topology and BPDUs The stable, active spanning-tree topology of a switched network...

  • Page 402

    Chapter 17 Configuring STP Understanding Spanning-Tree Features Only one outgoing port on the stack root switch is selected as...

  • Page 403

    Chapter 17 Configuring STP Understanding Spanning-Tree Features The switch supports the IEEE 802.1t spanning-tree extensions, and some of the...

  • Page 404

    Chapter 17 Configuring STP Understanding Spanning-Tree Features • From learning to forwarding or to disabled • From forwarding to...

  • Page 405

    Chapter 17 Configuring STP Understanding Spanning-Tree Features • Does not learn addresses • Receives BPDUs Listening State The listening state...

  • Page 406

    Chapter 17 Configuring STP Understanding Spanning-Tree Features How a Switch or Port Becomes the Root Switch or Root Port...

  • Page 407

    Chapter 17 Configuring STP Understanding Spanning-Tree Features Figure 17-4 Spanning Tree and Redundant Connectivity Active link 201769 Blocked link Blade...

  • Page 408

    Chapter 17 Configuring STP Understanding Spanning-Tree Features Spanning-Tree Modes and Protocols The switch supports these spanning-tree modes and protocols:...

  • Page 409

    Chapter 17 Configuring STP Understanding Spanning-Tree Features Spanning-Tree Interoperability and Backward Compatibility Table 17-2 lists the interoperability and compatibility among...

  • Page 410

    Chapter 17 Configuring STP Configuring Spanning-Tree Features VLAN spanning trees to prevent loops from forming if there are multiple...

  • Page 411

    Chapter 17 Configuring STP Configuring Spanning-Tree Features • Configuring the Switch Priority of a VLAN, page 17-21 (optional) •...

  • Page 412

    Chapter 17 Configuring STP Configuring Spanning-Tree Features Caution Switches that are not running spanning tree still forward BPDUs that...

  • Page 413

    Chapter 17 Configuring STP Configuring Spanning-Tree Features Changing the Spanning-Tree Mode. The switch supports three spanning-tree modes: PVST+, rapid PVST+,...

  • Page 414

    Chapter 17 Configuring STP Configuring Spanning-Tree Features Disabling Spanning Tree Spanning tree is enabled by default on VLAN 1...

  • Page 415

    Chapter 17 Configuring STP Configuring Spanning-Tree Features Note The root switch for each spanning-tree instance should be a backbone or...

  • Page 416

    Chapter 17 Configuring STP Configuring Spanning-Tree Features Configuring a Secondary Root Switch When you configure a switch as the...

  • Page 417

    Chapter 17 Configuring STP Configuring Spanning-Tree Features Note If your switch is a member of a switch stack, you must...

  • Page 418

    Chapter 17 Configuring STP Configuring Spanning-Tree Features To return to the default setting, use the no spanning-tree [vlan vlan-id]...

  • Page 419

    Chapter 17 Configuring STP Configuring Spanning-Tree Features Note The show spanning-tree interface interface-id privileged EXEC command displays information only for...

  • Page 420

    Chapter 17 Configuring STP Configuring Spanning-Tree Features Configuring Spanning-Tree Timers Table 17-4 describes the timers that affect the entire...

  • Page 421

    Chapter 17 Configuring STP Configuring Spanning-Tree Features Configuring the Forwarding-Delay Time for a VLAN Beginning in privileged EXEC mode, follow...

  • Page 422

    Chapter 17 Configuring STP Displaying the Spanning-Tree Status Configuring the Transmit Hold-Count You can configure the BPDU burst size...

  • Page 423: Configuring MSTP

    CH A P T E R 18 Configuring MSTP This chapter describes how to configure the Cisco implementation of...

  • Page 424

    Chapter 18 Configuring MSTP Understanding MSTP • Configuring MSTP Features, page 18-14 • Displaying the MST Configuration and Status,...

  • Page 425

    Chapter 18 Configuring MSTP Understanding MSTP IST, CIST, and CST Unlike PVST+ and rapid PVST+ in which all the spanning-tree...

  • Page 426

    Chapter 18 Configuring MSTP Understanding MSTP For correct operation, all switches in the MST region must agree on the...

  • Page 427

    Chapter 18 Configuring MSTP Understanding MSTP MSTP switches use Version 3 RSTP BPDUs or IEEE 802.1D STP BPDUs to communicate...

  • Page 428

    Chapter 18 Configuring MSTP Understanding MSTP The message-age and maximum-age information in the RSTP portion of the BPDU remain...

  • Page 429

    Chapter 18 Configuring MSTP Understanding MSTP Port Role Naming Change The boundary role is no longer in the final MST...

  • Page 430

    Chapter 18 Configuring MSTP Understanding MSTP Detecting Unidirectional Link Failure This feature is not yet present in the IEEE...

  • Page 431

    Chapter 18 Configuring MSTP Understanding RSTP Interoperability with IEEE 802.1D STP A switch running MSTP supports a built-in protocol migration...

  • Page 432

    Chapter 18 Configuring MSTP Understanding RSTP • Backup port—Acts as a backup for the path provided by a designated...

  • Page 433

    Chapter 18 Configuring MSTP Understanding RSTP After receiving Switch B’s agreement message, Switch A also immediately transitions its designated port...

  • Page 434

    Chapter 18 Configuring MSTP Understanding RSTP If a designated port is in the forwarding state and is not configured...

  • Page 435

    Chapter 18 Configuring MSTP Understanding RSTP Table 18-3 RSTP BPDU Flags (continued) Bit Function 5 Forwarding 6 Agreement 7 Topology...

  • Page 436

    Chapter 18 Configuring MSTP Configuring MSTP Features • Notification—Unlike IEEE 802.1D, which uses TCN BPDUs, the RSTP does not...

  • Page 437

    Chapter 18 Configuring MSTP Configuring MSTP Features Default MSTP Configuration Table 18-4 shows the default MSTP configuration. Table 18-4 Default...

  • Page 438

    Chapter 18 Configuring MSTP Configuring MSTP Features • VTP propagation of the MST configuration is not supported. However, you...

  • Page 439

    Chapter 18 Configuring MSTP Configuring MSTP Features Command Purpose Step 5 revision version Specify the configuration revision number. The range...

  • Page 440

    Chapter 18 Configuring MSTP Configuring MSTP Features To configure a switch to become the root, use the spanning-tree mst...

  • Page 441

    Chapter 18 Configuring MSTP Configuring MSTP Features Command Purpose Step 4 show spanning-tree mst instance-id Verify your entries. Step 5...

  • Page 442

    Chapter 18 Configuring MSTP Configuring MSTP Features Configuring Port Priority If a loop occurs, the MSTP uses the port...

  • Page 443

    Chapter 18 Configuring MSTP Configuring MSTP Features To return the interface to its default setting, use the no spanning-tree mst...

  • Page 444

    Chapter 18 Configuring MSTP Configuring MSTP Features Configuring the Switch Priority You can configure the switch priority and make...

  • Page 445

    Chapter 18 Configuring MSTP Configuring MSTP Features Beginning in privileged EXEC mode, follow these steps to configure the hello time...

  • Page 446

    Chapter 18 Configuring MSTP Configuring MSTP Features Configuring the Maximum-Aging Time Beginning in privileged EXEC mode, follow these steps...

  • Page 447

    Chapter 18 Configuring MSTP Configuring MSTP Features By default, the link type is controlled from the duplex mode of the...

  • Page 448

    Chapter 18 Configuring MSTP Displaying the MST Configuration and Status Restarting the Protocol Migration Process A switch running MSTP...

  • Page 449: Configuring Optional Spanning-Tree Features

    CH A P T E R 19 Configuring Optional Spanning-Tree Features This chapter describes how to configure optional spanning-tree...

  • Page 450

    Chapter 19 Configuring Optional Spanning-Tree Features Understanding Optional Spanning-Tree Features Understanding Port Fast Port Fast immediately brings an interface...

  • Page 451

    Chapter 19 Configuring Optional Spanning-Tree Features Understanding Optional Spanning-Tree Features At the interface level, you enable BPDU guard on any...

  • Page 452

    Chapter 19 Configuring Optional Spanning-Tree Features Understanding Optional Spanning-Tree Features Figure 19-2 Switches in a Hierarchical Network Backbone switches...

  • Page 453

    Chapter 19 Configuring Optional Spanning-Tree Features Understanding Optional Spanning-Tree Features Figure 19-3 UplinkFast Example Before Direct Link Failure Switch A...

  • Page 454

    Chapter 19 Configuring Optional Spanning-Tree Features Understanding Optional Spanning-Tree Features How CSUF Works CSUF ensures that one link in...

  • Page 455

    Chapter 19 Configuring Optional Spanning-Tree Features Understanding Optional Spanning-Tree Features Each switch in the stack decides if the sending switch...

  • Page 456

    Chapter 19 Configuring Optional Spanning-Tree Features Understanding Optional Spanning-Tree Features BackboneFast, which is enabled by using the spanning-tree backbonefast...

  • Page 457

    Chapter 19 Configuring Optional Spanning-Tree Features Understanding Optional Spanning-Tree Features If link L1 fails as shown in Figure 19-7, Switch...

  • Page 458

    Chapter 19 Configuring Optional Spanning-Tree Features Understanding Optional Spanning-Tree Features Understanding EtherChannel Guard You can use EtherChannel guard to...

  • Page 459

    Chapter 19 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features Figure 19-9 Root Guard in a Data-Center Network Customer network...

  • Page 460

    Chapter 19 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features • Enabling BackboneFast, page 19-16 (optional) • Enabling EtherChannel...

  • Page 461

    Chapter 19 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features Beginning in privileged EXEC mode, follow these steps to enable...

  • Page 462

    Chapter 19 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features The BPDU guard feature provides a secure response to...

  • Page 463

    Chapter 19 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features You can also use the spanning-tree bpdufilter enable interface configuration...

  • Page 464

    Chapter 19 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features Beginning in privileged EXEC mode, follow these steps to...

  • Page 465

    Chapter 19 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features Note If you use BackboneFast, you must enable it on...

  • Page 466

    Chapter 19 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features Enabling Root Guard Root guard enabled on an interface...

  • Page 467

    Chapter 19 Configuring Optional Spanning-Tree Features Displaying the Spanning-Tree Status Command Purpose Step 3 spanning-tree loopguard default Enable loop guard....

  • Page 468

    Chapter 19 Configuring Optional Spanning-Tree Features Displaying the Spanning-Tree Status Cisco Catalyst Blade Switch 3130 for Dell Software Configuration...

  • Page 469: Configuring Flex Links and the MAC Address-Table Move Update Feature

    CH A P T E R 20 Configuring Flex Links and the MAC Address-Table Move Update Feature This chapter...

  • Page 470

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Understanding Flex Links and the MAC Address-Table...

  • Page 471

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Understanding Flex Links and the MAC Address-Table Move...

  • Page 472

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Understanding Flex Links and the MAC Address-Table...

  • Page 473

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Configuring Flex Links and MAC Address-Table Move Update...

  • Page 474

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Configuring Flex Links and MAC Address-Table Move...

  • Page 475

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Configuring Flex Links and MAC Address-Table Move Update...

  • Page 476

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Configuring Flex Links and MAC Address-Table Move...

  • Page 477

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Configuring Flex Links and MAC Address-Table Move Update...

  • Page 478

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Configuring Flex Links and MAC Address-Table Move...

  • Page 479

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Monitoring Flex Links and the MAC Address-Table Move...

  • Page 480

    Chapter 20 Configuring Flex Links and the MAC Address-Table Move Update Feature Monitoring Flex Links and the MAC Address-Table...

  • Page 481: Configuring DHCP Features and IP Source Guard

    CH A P T E R 21 Configuring DHCP Features and IP Source Guard This chapter describes how to...

  • Page 482

    Chapter 21 Configuring DHCP Features and IP Source Guard Understanding DHCP Features For information about the DHCP client, see...

  • Page 483

    Chapter 21 Configuring DHCP Features and IP Source Guard Understanding DHCP Features The switch drops a DHCP packet when one...

  • Page 484

    Chapter 21 Configuring DHCP Features and IP Source Guard Understanding DHCP Features Figure 21-1 is an example of a...

  • Page 485

    Chapter 21 Configuring DHCP Features and IP Source Guard Understanding DHCP Features • Remote-ID suboption fields – Suboption type –...

  • Page 486

    Chapter 21 Configuring DHCP Features and IP Source Guard Understanding DHCP Features The values for these fields in the...

  • Page 487

    Chapter 21 Configuring DHCP Features and IP Source Guard Understanding DHCP Features Each database entry (binding) has an IP address,...

  • Page 488

    Chapter 21 Configuring DHCP Features and IP Source Guard Configuring DHCP Features DHCP Snooping and Switch Stacks DHCP snooping...

  • Page 489

    Chapter 21 Configuring DHCP Features and IP Source Guard Configuring DHCP Features Table 21-1 Default DHCP Configuration (continued) Feature Default...

  • Page 490

    Chapter 21 Configuring DHCP Features and IP Source Guard Configuring DHCP Features • Before configuring the DHCP relay agent...

  • Page 491

    Chapter 21 Configuring DHCP Features and IP Source Guard Configuring DHCP Features Configuring the DHCP Relay Agent Beginning in privileged...

  • Page 492

    Chapter 21 Configuring DHCP Features and IP Source Guard Configuring DHCP Features Command Purpose Step 6 interface range port-range...

  • Page 493

    Chapter 21 Configuring DHCP Features and IP Source Guard Configuring DHCP Features Command Purpose Step 6 ip dhcp snooping information...

  • Page 494

    Chapter 21 Configuring DHCP Features and IP Source Guard Configuring DHCP Features Switch(config)# interface gigabitethernet2/0/1 Switch(config-if)# ip dhcp snooping...

  • Page 495

    Chapter 21 Configuring DHCP Features and IP Source Guard Displaying DHCP Snooping Information Command Purpose Step 3 ip dhcp snooping...

  • Page 496

    Chapter 21 Configuring DHCP Features and IP Source Guard Understanding IP Source Guard Note If DHCP snooping is enabled...

  • Page 497

    Chapter 21 Configuring DHCP Features and IP Source Guard Configuring IP Source Guard Source IP and MAC Address Filtering When...

  • Page 498

    Chapter 21 Configuring DHCP Features and IP Source Guard Configuring IP Source Guard • When configuring IP source guard...

  • Page 499

    Chapter 21 Configuring DHCP Features and IP Source Guard Displaying IP Source Guard Information Command Purpose Step 8 show ip...

  • Page 500

    Chapter 21 Configuring DHCP Features and IP Source Guard Displaying IP Source Guard Information Cisco Catalyst Blade Switch 3130...

  • Page 501: Configuring Dynamic ARP Inspection

    CH A P T E R 22 Configuring Dynamic ARP Inspection This chapter describes how to configure dynamic Address...

  • Page 502

    Chapter 22 Configuring Dynamic ARP Inspection Understanding Dynamic ARP Inspection Figure 22-1 ARP Cache Poisoning A B Host A...

  • Page 503

    Chapter 22 Configuring Dynamic ARP Inspection Understanding Dynamic ARP Inspection You can configure dynamic ARP inspection to drop ARP packets...

  • Page 504

    Chapter 22 Configuring Dynamic ARP Inspection Understanding Dynamic ARP Inspection Dynamic ARP inspection ensures that hosts (on untrusted interfaces)...

  • Page 505

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection Logging of Dropped Packets When the switch drops a packet,...

  • Page 506

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection Table 22-1 Default Dynamic ARP Inspection Configuration (continued) Feature...

  • Page 507

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection • The operating rate for the port channel is cumulative...

  • Page 508

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection Command Purpose Step 3 ip arp inspection vlan vlan-range...

  • Page 509

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection If you configure port 1 on Switch A as trusted,...

  • Page 510

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection Command Purpose Step 5 ip arp inspection filter arp-acl-name...

  • Page 511

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection To remove the ARP ACL, use the no arp access-list...

  • Page 512

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection Command Purpose Step 4 exit Return to global configuration...

  • Page 513

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection Beginning in privileged EXEC mode, follow these steps to perform...

  • Page 514

    Chapter 22 Configuring Dynamic ARP Inspection Configuring Dynamic ARP Inspection If the log buffer overflows, it means that a...

  • Page 515

    Chapter 22 Configuring Dynamic ARP Inspection Displaying Dynamic ARP Inspection Information Command Purpose Step 3 ip arp inspection vlan vlan-range...

  • Page 516

    Chapter 22 Configuring Dynamic ARP Inspection Displaying Dynamic ARP Inspection Information To clear or display dynamic ARP inspection statistics,...

  • Page 517: Configuring IGMP Snooping and MVR

    CH A P T E R 23 Configuring IGMP Snooping and MVR This chapter describes how to configure Internet...

  • Page 518

    Chapter 23 Configuring IGMP Snooping and MVR Understanding IGMP Snooping Understanding IGMP Snooping Layer 2 switches can use IGMP...

  • Page 519

    Chapter 23 Configuring IGMP Snooping and MVR Understanding IGMP Snooping IGMP Versions The switch supports IGMP Version 1, IGMP Version...

  • Page 520

    Chapter 23 Configuring IGMP Snooping and MVR Understanding IGMP Snooping Figure 23-1 Initial IGMP Join Message Router A 19...

  • Page 521

    Chapter 23 Configuring IGMP Snooping and MVR Understanding IGMP Snooping If another blade server (for example, Blade Server 4) sends...

  • Page 522

    Chapter 23 Configuring IGMP Snooping and MVR Understanding IGMP Snooping Immediate Leave Immediate Leave is only supported on IGMP...

  • Page 523

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Snooping IGMP Snooping and Switch Stacks IGMP snooping functions across the...

  • Page 524

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Snooping Table 23-3 Default IGMP Snooping Configuration (continued) Feature Default...

  • Page 525

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Snooping Setting the Snooping Method Multicast-capable router ports are added to...

  • Page 526

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Snooping This example shows how to configure IGMP snooping to...

  • Page 527

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Snooping Beginning in privileged EXEC mode, follow these steps to add...

  • Page 528

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Snooping To disable IGMP Immediate Leave on a VLAN, use...

  • Page 529

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Snooping Controlling the Multicast Flooding Time After a TCN Event You...

  • Page 530

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Snooping To return to the default query solicitation, use the...

  • Page 531

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Snooping • When it is administratively enabled, the IGMP snooping querier...

  • Page 532

    Chapter 23 Configuring IGMP Snooping and MVR Displaying IGMP Snooping Information This example shows how to set the IGMP...

  • Page 533

    Chapter 23 Configuring IGMP Snooping and MVR Displaying IGMP Snooping Information To display IGMP snooping information, use one or more...

  • Page 534

    Chapter 23 Configuring IGMP Snooping and MVR Understanding Multicast VLAN Registration Understanding Multicast VLAN Registration Multicast VLAN Registration (MVR)...

  • Page 535

    Chapter 23 Configuring IGMP Snooping and MVR Understanding Multicast VLAN Registration Using MVR in a Multicast Television Application In a...

  • Page 536

    Chapter 23 Configuring IGMP Snooping and MVR Configuring MVR IGMP leave was received. As soon as the leave message...

  • Page 537

    Chapter 23 Configuring IGMP Snooping and MVR Configuring MVR MVR Configuration Guidelines and Limitations Follow these guidelines when configuring MVR:...

  • Page 538

    Chapter 23 Configuring IGMP Snooping and MVR Configuring MVR Command Purpose Step 5 mvr vlan vlan-id (Optional) Specify the...

  • Page 539

    Chapter 23 Configuring IGMP Snooping and MVR Configuring MVR Command Purpose Step 4 mvr type {source | receiver} Configure an...

  • Page 540

    Chapter 23 Configuring IGMP Snooping and MVR Displaying MVR Information Displaying MVR Information You can display MVR information for...

  • Page 541

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Filtering and Throttling IGMP filtering is applicable only to the dynamic...

  • Page 542

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Filtering and Throttling • permit: Specifies that matching addresses are...

  • Page 543

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Filtering and Throttling Beginning in privileged EXEC mode, follow these steps...

  • Page 544

    Chapter 23 Configuring IGMP Snooping and MVR Configuring IGMP Filtering and Throttling To remove the maximum group limitation and...

  • Page 545

    Chapter 23 Configuring IGMP Snooping and MVR Displaying IGMP Filtering and Throttling Configuration Command Purpose Step 4 end Return to...

  • Page 546

    Chapter 23 Configuring IGMP Snooping and MVR Displaying IGMP Filtering and Throttling Configuration Cisco Catalyst Blade Switch 3130 for...

  • Page 547: Configuring IPv6 MLD Snooping

    CH A P T E R 24 Configuring IPv6 MLD Snooping You can use Multicast Listener Discovery (MLD) snooping...

  • Page 548

    Chapter 24 Configuring IPv6 MLD Snooping Understanding MLD Snooping MLD is a protocol used by IPv6 multicast routers to...

  • Page 549

    Chapter 24 Configuring IPv6 MLD Snooping Understanding MLD Snooping MLD Messages MLDv1 supports three types of messages: • Listener Queries...

  • Page 550

    Chapter 24 Configuring IPv6 MLD Snooping Understanding MLD Snooping Multicast Router Discovery Like IGMP snooping, MLD snooping performs multicast...

  • Page 551

    Chapter 24 Configuring IPv6 MLD Snooping Configuring IPv6 MLD Snooping The number of MASQs generated is configured by using the...

  • Page 552

    Chapter 24 Configuring IPv6 MLD Snooping Configuring IPv6 MLD Snooping Default MLD Snooping Configuration Table 24-1 shows the default...

  • Page 553

    Chapter 24 Configuring IPv6 MLD Snooping Configuring IPv6 MLD Snooping Enabling or Disabling MLD Snooping By default, IPv6 MLD snooping...

  • Page 554

    Chapter 24 Configuring IPv6 MLD Snooping Configuring IPv6 MLD Snooping Configuring a Static Multicast Group Hosts or Layer 2...

  • Page 555

    Chapter 24 Configuring IPv6 MLD Snooping Configuring IPv6 MLD Snooping Beginning in privileged EXEC mode, follow these steps to add...

  • Page 556

    Chapter 24 Configuring IPv6 MLD Snooping Configuring IPv6 MLD Snooping Configuring MLD Snooping Queries When Immediate Leave is not...

  • Page 557

    Chapter 24 Configuring IPv6 MLD Snooping Displaying MLD Snooping Information This example shows how to set the MLD snooping global...

  • Page 558

    Chapter 24 Configuring IPv6 MLD Snooping Displaying MLD Snooping Information Table 24-2 Commands for Displaying MLD Snooping Information Command...

  • Page 559: Configuring Port-Based Traffic Control

    CH A P T E R 25 Configuring Port-Based Traffic Control This chapter describes how to configure the port-based...

  • Page 560

    Chapter 25 Configuring Port-Based Traffic Control Configuring Storm Control Storm control uses one of these methods to measure traffic...

  • Page 561

    Chapter 25 Configuring Port-Based Traffic Control Configuring Storm Control You use the storm-control interface configuration commands to set the threshold...

  • Page 562

    Chapter 25 Configuring Port-Based Traffic Control Configuring Storm Control Command Purpose Step 3 storm-control {broadcast | multicast | Configure...

  • Page 563

    Chapter 25 Configuring Port-Based Traffic Control Configuring Protected Ports Command Purpose Step 6 show storm-control [interface-id] [broadcast | Verify the...

  • Page 564

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Blocking Protected Port Configuration Guidelines You can configure protected ports on...

  • Page 565

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security Default Port Blocking Configuration The default is to not block flooding...

  • Page 566

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security These sections contain this conceptual and configuration information: • Understanding...

  • Page 567

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security If sticky learning is disabled, the sticky secure MAC addresses are...

  • Page 568

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security Table 25-1 Security Violation Mode Actions Violation Traffic is Sends...

  • Page 569

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security • A secure port cannot be a private-VLAN port. • When...

  • Page 570

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security Enabling and Configuring Port Security Beginning in privileged EXEC mode,...

  • Page 571

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security Command Purpose Step 7 switchport port-security violation (Optional) Set the violation...

  • Page 572

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security Command Purpose Step 8 switchport port-security (Optional) Enter a secure...

  • Page 573

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security To return the interface to the default condition as not a...

  • Page 574

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security Switch(config-if)# switchport port-security mac-address 0000.0000.0003 Switch(config-if)# switchport port-security mac-address sticky...

  • Page 575

    Chapter 25 Configuring Port-Based Traffic Control Configuring Port Security To disable port security aging for all secure addresses on a...

  • Page 576

    Chapter 25 Configuring Port-Based Traffic Control Displaying Port-Based Traffic Control Settings This example shows how to configure port security...

  • Page 577: Configuring CDP

    CH A P T E R 26 Configuring CDP This chapter describes how to configure Cisco Discovery Protocol (CDP)...

  • Page 578

    Chapter 26 Configuring CDP Configuring CDP CDP and Switch Stacks A switch stack appears as a single switch in...

  • Page 579

    Chapter 26 Configuring CDP Configuring CDP Command Purpose Step 3 cdp holdtime seconds (Optional) Specify the amount of time a...

  • Page 580

    Chapter 26 Configuring CDP Configuring CDP Disabling and Enabling CDP on an Interface CDP is enabled by default on...

  • Page 581

    Chapter 26 Configuring CDP Monitoring and Maintaining CDP Monitoring and Maintaining CDP To monitor and maintain CDP on your device,...

  • Page 582

    Chapter 26 Configuring CDP Monitoring and Maintaining CDP Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 26-6...

  • Page 583: Configuring LLDP and LLDP-MED

    CH A P T E R 27 Configuring LLDP and LLDP-MED This chapter describes how to configure the Link...

  • Page 584

    Chapter 27 Configuring LLDP and LLDP-MED Understanding LLDP and LLDP-MED LLDP supports a set of attributes that it uses...

  • Page 585

    Chapter 27 Configuring LLDP and LLDP-MED Configuring LLDP and LLDP-MED • Location TLV Provides location information from the switch to...

  • Page 586

    Chapter 27 Configuring LLDP and LLDP-MED Configuring LLDP and LLDP-MED Table 27-1 Default LLDP Configuration (continued) Feature Default Setting...

  • Page 587

    Chapter 27 Configuring LLDP and LLDP-MED Configuring LLDP and LLDP-MED Disabling and Enabling LLDP Globally LLDP is enabled by default....

  • Page 588

    Chapter 27 Configuring LLDP and LLDP-MED Configuring LLDP and LLDP-MED Command Purpose Step 5 end Return to privileged EXEC...

  • Page 589

    Chapter 27 Configuring LLDP and LLDP-MED Monitoring and Maintaining LLDP and LLDP-MED Command Purpose Step 3 no lldp med-tlv-select tlv...

  • Page 590

    Chapter 27 Configuring LLDP and LLDP-MED Monitoring and Maintaining LLDP and LLDP-MED Cisco Catalyst Blade Switch 3130 for Dell...

  • Page 591: Configuring UDLD

    CH A P T E R 28 Configuring UDLD This chapter describes how to configure the UniDirectional Link Detection...

  • Page 592

    Chapter 28 Configuring UDLD Understanding UDLD In normal mode, UDLD detects a unidirectional link when fiber strands in a...

  • Page 593

    Chapter 28 Configuring UDLD Configuring UDLD If the detection window ends and no valid reply message is received, the link...

  • Page 594

    Chapter 28 Configuring UDLD Configuring UDLD Default UDLD Configuration Table 28-1 shows the default UDLD configuration. Table 28-1 Default...

  • Page 595

    Chapter 28 Configuring UDLD Configuring UDLD Enabling UDLD Globally Beginning in privileged EXEC mode, follow these steps to enable UDLD...

  • Page 596

    Chapter 28 Configuring UDLD Configuring UDLD Enabling UDLD on an Interface Beginning in privileged EXEC mode, follow these steps...

  • Page 597

    Chapter 28 Configuring UDLD Displaying UDLD Status Displaying UDLD Status To display the UDLD status for the specified port or...

  • Page 598

    Chapter 28 Configuring UDLD Displaying UDLD Status Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 28-8 OL-13270-01...

  • Page 599: Configuring SPAN and RSPAN

    CH A P T E R 29 Configuring SPAN and RSPAN This chapter describes how to configure Switched Port...

  • Page 600

    Chapter 29 Configuring SPAN and RSPAN Understanding SPAN and RSPAN These sections contain this conceptual information: • Local SPAN,...

  • Page 601

    Chapter 29 Configuring SPAN and RSPAN Understanding SPAN and RSPAN Figure 29-2 Example of Local SPAN Configuration on a Switch...

  • Page 602

    Chapter 29 Configuring SPAN and RSPAN Understanding SPAN and RSPAN Figure 29-3 Example of RSPAN Configuration RSPAN destination ports...

  • Page 603

    Chapter 29 Configuring SPAN and RSPAN Understanding SPAN and RSPAN An RSPAN source session is very similar to a local...

  • Page 604

    Chapter 29 Configuring SPAN and RSPAN Understanding SPAN and RSPAN Features that can cause a packet to be dropped...

  • Page 605

    Chapter 29 Configuring SPAN and RSPAN Understanding SPAN and RSPAN A source port has these characteristics: • It can be...

  • Page 606

    Chapter 29 Configuring SPAN and RSPAN Understanding SPAN and RSPAN Destination Port Each local SPAN session or RSPAN destination...

  • Page 607

    Chapter 29 Configuring SPAN and RSPAN Understanding SPAN and RSPAN RSPAN VLAN The RSPAN VLAN carries SPAN traffic between RSPAN...

  • Page 608

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN A physical port that belongs to an EtherChannel group...

  • Page 609

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN Default SPAN and RSPAN Configuration Table 29-1 shows the default...

  • Page 610

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN • You can limit SPAN traffic to specific VLANs...

  • Page 611

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN Command Purpose Step 4 monitor session session_number Specify the SPAN...

  • Page 612

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN This example shows how to remove any existing configuration...

  • Page 613

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN Command Purpose Step 5 end Return to privileged EXEC mode....

  • Page 614

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN Command Purpose Step 5 monitor session session_number Specify the...

  • Page 615

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN • You can apply an output ACL to RSPAN traffic...

  • Page 616

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN To remove the remote SPAN characteristic from a VLAN...

  • Page 617

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN Command Purpose Step 6 show monitor [session session_number] Verify the...

  • Page 618

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN Command Purpose Step 5 monitor session session_number Specify the...

  • Page 619

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN Command Purpose Step 6 monitor session session_number source Specify the...

  • Page 620

    Chapter 29 Configuring SPAN and RSPAN Configuring SPAN and RSPAN Command Purpose Step 3 monitor session session_number source Specify...

  • Page 621

    Chapter 29 Configuring SPAN and RSPAN Displaying SPAN and RSPAN Status Displaying SPAN and RSPAN Status To display the current...

  • Page 622

    Chapter 29 Configuring SPAN and RSPAN Displaying SPAN and RSPAN Status Cisco Catalyst Blade Switch 3130 for Dell Software...

  • Page 623: Configuring RMON

    CH A P T E R 30 Configuring RMON This chapter describes how to configure Remote Network Monitoring (RMON)...

  • Page 624

    Chapter 30 Configuring RMON Configuring RMON Figure 30-1 Remote Monitoring Example Network management station with generic RMON console application...

  • Page 625

    Chapter 30 Configuring RMON Configuring RMON Default RMON Configuration RMON is disabled by default; no alarms or events are configured....

  • Page 626

    Chapter 30 Configuring RMON Configuring RMON Command Purpose Step 3 rmon event number [description string] [log] [owner string] Add...

  • Page 627

    Chapter 30 Configuring RMON Configuring RMON Collecting Group History Statistics on an Interface You must first configure RMON alarms and...

  • Page 628

    Chapter 30 Configuring RMON Displaying RMON Status Command Purpose Step 3 rmon collection stats index [owner ownername] Enable RMON...

  • Page 629: Configuring System Message Logging

    CH A P T E R 31 Configuring System Message Logging This chapter describes how to configure system message...

  • Page 630

    Chapter 31 Configuring System Message Logging Configuring System Message Logging You can set the severity level of the messages...

  • Page 631

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Table 31-1 describes the elements of syslog messages. Table 31-1...

  • Page 632

    Chapter 31 Configuring System Message Logging Configuring System Message Logging *Mar 1 18:46:11: %SYS-5-CONFIG_I: Configured from console by vty2...

  • Page 633

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Disabling the logging process can slow down the switch because...

  • Page 634

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Command Purpose Step 4 logging file flash:filename Store log...

  • Page 635

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Beginning in privileged EXEC mode, follow these steps to configure...

  • Page 636

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Enabling and Disabling Time Stamps on Log Messages By...

  • Page 637

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Command Purpose Step 4 show running-config Verify your entries. Step...

  • Page 638

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Table 31-3 describes the level keywords. It also lists...

  • Page 639

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Beginning in privileged EXEC mode, follow these steps to change...

  • Page 640

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Beginning in privileged EXEC mode, follow these steps to...

  • Page 641

    Chapter 31 Configuring System Message Logging Configuring System Message Logging Log in as root, and perform these steps: Note Some...

  • Page 642

    Chapter 31 Configuring System Message Logging Displaying the Logging Configuration Command Purpose Step 6 show running-config Verify your entries....

  • Page 643: Configuring SNMP

    CH A P T E R 32 Configuring SNMP This chapter describes how to configure the Simple Network Management...

  • Page 644

    Chapter 32 Configuring SNMP Understanding SNMP These sections contain this conceptual information: • SNMP Versions, page 32-2 • SNMP...

  • Page 645

    Chapter 32 Configuring SNMP Understanding SNMP Table 32-1 identifies the characteristics of the different combinations of security models and levels....

  • Page 646

    Chapter 32 Configuring SNMP Understanding SNMP SNMP Agent Functions The SNMP agent responds to SNMP manager requests as follows:...

  • Page 647

    Chapter 32 Configuring SNMP Understanding SNMP SNMP Notifications SNMP allows the switch to send notifications to SNMP managers when particular...

  • Page 648

    Chapter 32 Configuring SNMP Configuring SNMP Configuring SNMP These sections contain this configuration information: • Default SNMP Configuration, page...

  • Page 649

    Chapter 32 Configuring SNMP Configuring SNMP When configuring SNMP, follow these guidelines: • When configuring an SNMP group, do not...

  • Page 650

    Chapter 32 Configuring SNMP Configuring SNMP Configuring Community Strings You use the SNMP community string to define the relationship...

  • Page 651

    Chapter 32 Configuring SNMP Configuring SNMP Command Purpose Step 5 show running-config Verify your entries. Step 6 copy running-config startup-config...

  • Page 652

    Chapter 32 Configuring SNMP Configuring SNMP Command Purpose Step 3 snmp-server group groupname {v1 | v2c | v3 Configure...

  • Page 653

    Chapter 32 Configuring SNMP Configuring SNMP Command Purpose Step 4 snmp-server user username groupname Add a new user for an...

  • Page 654

    Chapter 32 Configuring SNMP Configuring SNMP Table 32-5 Switch Notification Types (continued) Notification Type Keyword Description cluster Generates a...

  • Page 655

    Chapter 32 Configuring SNMP Configuring SNMP Table 32-5 Switch Notification Types (continued) Notification Type Keyword Description vlan-membership Generates a trap...

  • Page 656

    Chapter 32 Configuring SNMP Configuring SNMP Command Purpose Step 5 snmp-server host host-addr Specify the recipient of an SNMP...

  • Page 657

    Chapter 32 Configuring SNMP Configuring SNMP To remove the specified host from receiving traps, use the no snmp-server host host...

  • Page 658

    Chapter 32 Configuring SNMP Configuring SNMP Command Purpose Step 3 access-list access-list-number {deny | Create a standard access list,...

  • Page 659

    Chapter 32 Configuring SNMP Displaying SNMP Status This example shows how to send Entity MIB traps to the host cisco.com....

  • Page 660

    Chapter 32 Configuring SNMP Displaying SNMP Status Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 32-18 OL-13270-01...

  • Page 661: Configuring Embedded Event Manager

    CH A P T E R 33 Configuring Embedded Event Manager This chapter describes how to use the embedded...

  • Page 662

    Chapter 33 Configuring Embedded Event Manager Understanding Embedded Event Manager Figure 33-1 Embedded Event Manager Core Event Detectors Core...

  • Page 663

    Chapter 33 Configuring Embedded Event Manager Understanding Embedded Event Manager EEM allows these event detectors: • Application-specific event detector– Allows...

  • Page 664

    Chapter 33 Configuring Embedded Event Manager Understanding Embedded Event Manager Embedded Event Manager Actions EEM provides actions that occur...

  • Page 665

    Chapter 33 Configuring Embedded Event Manager Configuring Embedded Event Manager • Cisco built-in variables (available in EEM applets) Defined by...

  • Page 666

    Chapter 33 Configuring Embedded Event Manager Configuring Embedded Event Manager Command Purpose Step 4 action label syslog [priority Specify...

  • Page 667

    Chapter 33 Configuring Embedded Event Manager Displaying Embedded Event Manager Information 4 _config_cmd1 interface Ethernet1/0 5 _config_cmd2 no shut This...

  • Page 668

    Chapter 33 Configuring Embedded Event Manager Displaying Embedded Event Manager Information Cisco Catalyst Blade Switch 3130 for Dell Software...

  • Page 669: Configuring Network Security with ACLs

    CH A P T E R 34 Configuring Network Security with ACLs This chapter describes how to configure network...

  • Page 670

    Chapter 34 Configuring Network Security with ACLs Understanding ACLs You configure access lists on a router or Layer 3...

  • Page 671

    Chapter 34 Configuring Network Security with ACLs Understanding ACLs • When an output router ACL and input port ACL exist...

  • Page 672

    Chapter 34 Configuring Network Security with ACLs Understanding ACLs Figure 34-1 Using ACLs to Control Traffic to a Network...

  • Page 673

    Chapter 34 Configuring Network Security with ACLs Understanding ACLs As with port ACLs, the switch examines ACLs associated with features...

  • Page 674

    Chapter 34 Configuring Network Security with ACLs Understanding ACLs Some ACEs do not check Layer 4 information and therefore...

  • Page 675

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs • If packets must be forwarded by software for any...

  • Page 676

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Creating Standard and Extended IPv4 ACLs This section describes...

  • Page 677

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Table 34-1 Access List Numbers (continued) Access List Number Type...

  • Page 678

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Creating a Numbered Standard ACL Beginning in privileged EXEC...

  • Page 679

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs The switch always rewrites the order of standard access lists...

  • Page 680

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Beginning in privileged EXEC mode, follow these steps to...

  • Page 681

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Command Purpose or access-list access-list-number In access-list configuration mode, define...

  • Page 682

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Command Purpose Step access-list access-list-number (Optional) Define an extended...

  • Page 683

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs After creating a numbered extended ACL, you can apply it...

  • Page 684

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Beginning in privileged EXEC mode, follow these steps to...

  • Page 685

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs When you are creating standard extended ACLs, remember that, by...

  • Page 686

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Beginning in privileged EXEC mode, follow these steps to...

  • Page 687

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs This example uses named ACLs to permit and deny the...

  • Page 688

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Beginning in privileged EXEC mode, follow these steps to...

  • Page 689

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Beginning in privileged EXEC mode, follow these steps to control...

  • Page 690

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Hardware and Software Treatment of IP ACLs ACL processing...

  • Page 691

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Use router ACLs to do this in one of two...

  • Page 692

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Numbered ACLs In this example, network 36.0.0.0 is a...

  • Page 693

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs Named ACLs This example creates a standard ACL named internet_filter...

  • Page 694

    Chapter 34 Configuring Network Security with ACLs Configuring IPv4 ACLs In this example of a numbered ACL, the Winter...

  • Page 695

    Chapter 34 Configuring Network Security with ACLs Creating Named MAC Extended ACLs This is a an example of a log...

  • Page 696

    Chapter 34 Configuring Network Security with ACLs Creating Named MAC Extended ACLs Command Purpose Step 3 {deny | permit}...

  • Page 697

    Chapter 34 Configuring Network Security with ACLs Creating Named MAC Extended ACLs Applying a MAC ACL to a Layer 2...

  • Page 698

    Chapter 34 Configuring Network Security with ACLs Configuring VLAN Maps Configuring VLAN Maps This section describes how to configure...

  • Page 699

    Chapter 34 Configuring Network Security with ACLs Configuring VLAN Maps VLAN Map Configuration Guidelines Follow these guidelines when configuring VLAN...

  • Page 700

    Chapter 34 Configuring Network Security with ACLs Configuring VLAN Maps Creating a VLAN Map Each VLAN map consists of...

  • Page 701

    Chapter 34 Configuring Network Security with ACLs Configuring VLAN Maps This example shows how to create a VLAN map to...

  • Page 702

    Chapter 34 Configuring Network Security with ACLs Configuring VLAN Maps Switch(config-ext-macl)# permit any any vines-ip Switch(config-ext-nacl)# exit Switch(config)# vlan...

  • Page 703

    Chapter 34 Configuring Network Security with ACLs Configuring VLAN Maps Denying Access to a Server on Anothera VLAN You can...

  • Page 704

    Chapter 34 Configuring Network Security with ACLs Using VLAN Maps with Router ACLs Using VLAN Maps with Router ACLs...

  • Page 705

    Chapter 34 Configuring Network Security with ACLs Using VLAN Maps with Router ACLs • Avoid including Layer 4 information in...

  • Page 706

    Chapter 34 Configuring Network Security with ACLs Using VLAN Maps with Router ACLs Figure 34-6 Applying ACLs on Bridged...

  • Page 707

    Chapter 34 Configuring Network Security with ACLs Displaying IPv4 ACL Configuration ACLs and Multicast Packets Figure 34-8 shows how ACLs...

  • Page 708

    Chapter 34 Configuring Network Security with ACLs Displaying IPv4 ACL Configuration Table 34-2 Commands for Displaying Access Lists and...

  • Page 709: Configuring IPv6 ACLs

    CH A P T E R 35 Configuring IPv6 ACLs When the switch is running the advanced IP services...

  • Page 710

    Chapter 35 Configuring IPv6 ACLs Understanding IPv6 ACLs Understanding IPv6 ACLs A switch running the advanced IP services feature...

  • Page 711

    Chapter 35 Configuring IPv6 ACLs Understanding IPv6 ACLs Supported ACL Features IPv6 ACLs on the switch have these characteristics: •...

  • Page 712

    Chapter 35 Configuring IPv6 ACLs Configuring IPv6 ACLs If a new switch takes over as stack master, it distributes...

  • Page 713

    Chapter 35 Configuring IPv6 ACLs Configuring IPv6 ACLs • You cannot use MAC ACLs to filter IPv6 frames. MAC ACLs...

  • Page 714

    Chapter 35 Configuring IPv6 ACLs Configuring IPv6 ACLs Command Purpose Step 3a {deny | permit} protocol Enter deny or...

  • Page 715

    Chapter 35 Configuring IPv6 ACLs Configuring IPv6 ACLs Command Purpose Step 3b {deny | permit} tcp (Optional) Define a TCP...

  • Page 716

    Chapter 35 Configuring IPv6 ACLs Configuring IPv6 ACLs Use the no {deny | permit} IPv6 access-list configuration commands with...

  • Page 717

    Chapter 35 Configuring IPv6 ACLs Displaying IPv6 ACLs Use the no ipv6 traffic-filter access-list-name interface configuration command to remove an...

  • Page 718

    Chapter 35 Configuring IPv6 ACLs Displaying IPv6 ACLs Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 35-10...

  • Page 719: Configuring QoS

    CH A P T E R 36 Configuring QoS This chapter describes how to configure quality of service (QoS)...

  • Page 720

    Chapter 36 Configuring QoS Understanding QoS Understanding QoS Typically, networks operate on a best-effort delivery basis, which means that...

  • Page 721

    Chapter 36 Configuring QoS Understanding QoS Figure 36-1 QoS Classification Layers in Frames and Packets Encapsulated Packet Layer 2 IP...

  • Page 722

    Chapter 36 Configuring QoS Understanding QoS Figure 36-2 shows the basic QoS model. Actions at the ingress port include...

  • Page 723

    Chapter 36 Configuring QoS Understanding QoS Classification Classification is the process of distinguishing one kind of traffic from another by...

  • Page 724

    Chapter 36 Configuring QoS Understanding QoS After classification, the packet is sent to the policing, marking, and the ingress...

  • Page 725

    Chapter 36 Configuring QoS Understanding QoS Classification Based on QoS ACLs You can use IP standard, IP extended, or Layer...

  • Page 726

    Chapter 36 Configuring QoS Understanding QoS The policy map can contain the police and police aggregate policy-map class configuration...

  • Page 727

    Chapter 36 Configuring QoS Understanding QoS Policing on Physical Ports In policy maps on physical ports, you can create these...

  • Page 728

    Chapter 36 Configuring QoS Understanding QoS Figure 36-4 Policing and Marking Flowchart on Physical Ports Start Get the clasification...

  • Page 729

    Chapter 36 Configuring QoS Understanding QoS When configuring policing on an SVI, you can create and configure a hierarchical policy...

  • Page 730

    Chapter 36 Configuring QoS Understanding QoS Mapping Tables During QoS processing, the switch represents the priority of all traffic...

  • Page 731

    Chapter 36 Configuring QoS Understanding QoS Queueing and Scheduling Overview The switch has queues at specific points to help...

  • Page 732

    Chapter 36 Configuring QoS Understanding QoS Figure 36-7 WTD and Queue Operation CoS 6-7 100% 1000 CoS 4-5 60%...

  • Page 733

    Chapter 36 Configuring QoS Understanding QoS Queueing and Scheduling on Ingress Queues Figure 36-8shows the queueing and scheduling flowchart for...

  • Page 734

    Chapter 36 Configuring QoS Understanding QoS You assign each packet that flows through the switch to a queue and...

  • Page 735

    Chapter 36 Configuring QoS Understanding QoS Queueing and Scheduling on Egress Queues Figure 36-9 shows the queueing and scheduling flowchart...

  • Page 736

    Chapter 36 Configuring QoS Understanding QoS These queues are assigned to a queue-set. All traffic exiting the switch flows...

  • Page 737

    Chapter 36 Configuring QoS Understanding QoS WTD Thresholds You can assign each packet that flows through the switch to a...

  • Page 738

    Chapter 36 Configuring QoS Configuring Auto-QoS • During policing, IP and non-IP packets can have another DSCP assigned to...

  • Page 739

    Chapter 36 Configuring QoS Configuring Auto-QoS Generated Auto-QoS Configuration By default, auto-QoS is disabled on all ports. When auto-QoS is...

  • Page 740

    Chapter 36 Configuring QoS Configuring Auto-QoS If the packet does not have a DSCP value of 24, 26, or...

  • Page 741

    Chapter 36 Configuring QoS Configuring Auto-QoS Table 36-5 Generated Auto-QoS Configuration (continued) Description Automatically Generated Command The switch automatically maps...

  • Page 742

    Chapter 36 Configuring QoS Configuring Auto-QoS Table 36-5 Generated Auto-QoS Configuration (continued) Description Automatically Generated Command The switch automatically...

  • Page 743

    Chapter 36 Configuring QoS Configuring Auto-QoS Effects of Auto-QoS on the Configuration When auto-QoS is enabled, the auto qos voip...

  • Page 744

    Chapter 36 Configuring QoS Configuring Auto-QoS Enabling Auto-QoS for VoIP Beginning in privileged EXEC mode, follow these steps to...

  • Page 745

    Chapter 36 Configuring QoS Configuring Auto-QoS Auto-QoS Configuration Example This section describes how you could implement auto-QoS in a network,...

  • Page 746

    Chapter 36 Configuring QoS Configuring Auto-QoS Note You should not configure any standard QoS commands before entering the auto-QoS...

  • Page 747

    Chapter 36 Configuring QoS Displaying Auto-QoS Information Displaying Auto-QoS Information To display the initial auto-QoS configuration, use the show auto...

  • Page 748

    Chapter 36 Configuring QoS Configuring Standard QoS Default Standard QoS Configuration QoS is disabled. There is no concept of...

  • Page 749

    Chapter 36 Configuring QoS Configuring Standard QoS Default Egress Queue Configuration Table 36-9 shows the default egress queue configuration for...

  • Page 750

    Chapter 36 Configuring QoS Configuring Standard QoS Default Mapping Table Configuration The default CoS-to-DSCP map is shown in Table...

  • Page 751

    Chapter 36 Configuring QoS Configuring Standard QoS • Follow these guidelines when configuring policy maps on physical ports or SVIs:...

  • Page 752

    Chapter 36 Configuring QoS Configuring Standard QoS • A switch that is running the IP services feature set supports...

  • Page 753

    Chapter 36 Configuring QoS Configuring Standard QoS Use the no mls qos vlan-based interface configuration command to disable VLAN-based QoS...

  • Page 754

    Chapter 36 Configuring QoS Configuring Standard QoS Figure 36-12 Port Trusted States within the QoS Domain Trusted interface Trunk...

  • Page 755

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 3 mls qos trust [cos | dscp | ip-precedence] Configure...

  • Page 756

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 3 mls qos cos {default-cos | override} Configure the...

  • Page 757

    Chapter 36 Configuring QoS Configuring Standard QoS In some situations, you can prevent a PC connected to the Cisco IP...

  • Page 758

    Chapter 36 Configuring QoS Configuring Standard QoS Regardless of the DSCP transparency configuration, the switch modifies the internal DSCP...

  • Page 759

    Chapter 36 Configuring QoS Configuring Standard QoS Figure 36-13 DSCP-Trusted State on a Port Bordering Another QoS Domain QoS Domain...

  • Page 760

    Chapter 36 Configuring QoS Configuring Standard QoS To return a port to its non-trusted state, use the no mls...

  • Page 761

    Chapter 36 Configuring QoS Configuring Standard QoS Classifying Traffic by Using ACLs You can classify IP traffic by using IP...

  • Page 762

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to create an IP...

  • Page 763

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to create a Layer 2...

  • Page 764

    Chapter 36 Configuring QoS Configuring Standard QoS Classifying Traffic by Using Class Maps You use the class-map global configuration...

  • Page 765

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 4 match {access-group acl-index-or-name | Define the match criterion to...

  • Page 766

    Chapter 36 Configuring QoS Configuring Standard QoS Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps...

  • Page 767

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to create a nonhierarchical policy...

  • Page 768

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 5 trust [cos | dscp | ip-precedence] Configure the...

  • Page 769

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 8 exit Return to policy map configuration mode. Step 9...

  • Page 770

    Chapter 36 Configuring QoS Configuring Standard QoS Switch(config-ext-mac)# exit Switch(config)# class-map macclass1 Switch(config-cmap)# match access-group maclist1 Switch(config-cmap)# exit Switch(config)#...

  • Page 771

    Chapter 36 Configuring QoS Configuring Standard QoS • When configuring a hierarchical policy map on trunk ports, the VLAN ranges...

  • Page 772

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 3 match {access-group acl-index-or-name | Define the match criterion...

  • Page 773

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 10 policy-map policy-map-name Create an interface-level policy map by entering...

  • Page 774

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 17 trust [cos | dscp | ip-precedence] Configure the...

  • Page 775

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 23 service-policy input policy-map-name Specify the VLAN-level policy-map name, and...

  • Page 776

    Chapter 36 Configuring QoS Configuring Standard QoS Switch(config-pmap-c)# exit Switch(config-pmap)# class-map cm-2 Switch(config-pmap-c)# match ip dscp 2 Switch(config-pmap-c)# service-policy...

  • Page 777

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 4 policy-map policy-map-name Create a policy map by entering the...

  • Page 778

    Chapter 36 Configuring QoS Configuring Standard QoS Switch(config-pmap-c)# trust dscp Switch(config-pmap-c)# police aggregate transmit1 Switch(config-pmap-c)# exit Switch(config-pmap)# class ipclass2...

  • Page 779

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to modify the CoS-to-DSCP map....

  • Page 780

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to modify the IP-precedence-to-DSCP...

  • Page 781

    Chapter 36 Configuring QoS Configuring Standard QoS To return to the default map, use the no mls qos policed-dscp global...

  • Page 782

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to modify the DSCP-to-CoS...

  • Page 783

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to modify the DSCP-to-DSCP-mutation map....

  • Page 784

    Chapter 36 Configuring QoS Configuring Standard QoS Note In the above DSCP-to-DSCP-mutation map, the mutated values are shown in...

  • Page 785

    Chapter 36 Configuring QoS Configuring Standard QoS Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds...

  • Page 786

    Chapter 36 Configuring QoS Configuring Standard QoS This example shows how to map DSCP values 0 to 6 to...

  • Page 787

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to allocate bandwidth between the...

  • Page 788

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to configure the priority...

  • Page 789

    Chapter 36 Configuring QoS Configuring Standard QoS These sections contain this configuration information: • Configuration Guidelines, page 36-71 • Allocating...

  • Page 790

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to configure the memory...

  • Page 791

    Chapter 36 Configuring QoS Configuring Standard QoS Command Purpose Step 7 show mls qos interface [interface-id] Verify your entries. buffers...

  • Page 792

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to map DSCP or...

  • Page 793

    Chapter 36 Configuring QoS Configuring Standard QoS Configuring SRR Shaped Weights on Egress Queues You can specify how much of...

  • Page 794

    Chapter 36 Configuring QoS Configuring Standard QoS Configuring SRR Shared Weights on Egress Queues In shared mode, the queues...

  • Page 795

    Chapter 36 Configuring QoS Configuring Standard QoS Beginning in privileged EXEC mode, follow these steps to enable the egress expedite...

  • Page 796

    Chapter 36 Configuring QoS Displaying Standard QoS Information Command Purpose Step 5 show mls qos interface [interface-id] Verify your...

  • Page 797: Configuring EtherChannels and Link-State Tracking

    CH A P T E R 37 Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels...

  • Page 798

    Chapter 37 Configuring EtherChannels and Link-State Tracking Understanding EtherChannels EtherChannel Overview An EtherChannel consists of individual Gigabit Ethernet links...

  • Page 799

    Chapter 37 Configuring EtherChannels and Link-State Tracking Understanding EtherChannels Figure 37-2 Single-Switch EtherChannel Blade switch stack Switch 1 Channel group...

  • Page 800

    Chapter 37 Configuring EtherChannels and Link-State Tracking Understanding EtherChannels Port-Channel Interfaces When you create an EtherChannel, a port-channel logical...

  • Page 801

    Chapter 37 Configuring EtherChannels and Link-State Tracking Understanding EtherChannels Port Aggregation Protocol The Port Aggregation Protocol (PAgP) is a Cisco-proprietary...

  • Page 802

    Chapter 37 Configuring EtherChannels and Link-State Tracking Understanding EtherChannels Use the silent mode when the switch is connected to...

  • Page 803

    Chapter 37 Configuring EtherChannels and Link-State Tracking Understanding EtherChannels Ports can form an EtherChannel when they are in different LACP...

  • Page 804

    Chapter 37 Configuring EtherChannels and Link-State Tracking Understanding EtherChannels With destination-MAC address forwarding, when packets are forwarded to an...

  • Page 805

    Chapter 37 Configuring EtherChannels and Link-State Tracking Understanding EtherChannels Figure 37-5 Load Distribution and Forwarding Methods Blade Blade Server 1...

  • Page 806

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels For more information about switch stacks, see Chapter 5, “Managing...

  • Page 807

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels EtherChannel Configuration Guidelines If improperly configured, some EtherChannel ports are automatically...

  • Page 808

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels – An EtherChannel supports the same allowed range of VLANs...

  • Page 809

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels Command Purpose Step 4 channel-group channel-group-number mode Assign the port to...

  • Page 810

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels This example shows how to configure an EtherChannel on a...

  • Page 811

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels Beginning in privileged EXEC mode, follow these steps to create a...

  • Page 812

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels Command Purpose Step 5 channel-group channel-group-number mode Assign the port...

  • Page 813

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels This example shows how to configure an EtherChannel. It assigns two...

  • Page 814

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels Command Purpose Step 3 end Return to privileged EXEC mode....

  • Page 815

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels Beginning in privileged EXEC mode, follow these steps to configure your...

  • Page 816

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels If you configure more than eight links for an EtherChannel...

  • Page 817

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring EtherChannels Configuring the LACP Port Priority By default, all ports use the...

  • Page 818

    Chapter 37 Configuring EtherChannels and Link-State Tracking Displaying EtherChannel, PAgP, and LACP Status Displaying EtherChannel, PAgP, and LACP Status...

  • Page 819

    Chapter 37 Configuring EtherChannels and Link-State Tracking Understanding Link-State Tracking Figure 37-6 Typical Link-State Tracking Configuration Distribution Layer 3...

  • Page 820

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring Link-State Tracking In a link-state group, the upstream ports can become...

  • Page 821

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring Link-State Tracking • Do not configure an EtherChannel as a downstream interface....

  • Page 822

    Chapter 37 Configuring EtherChannels and Link-State Tracking Configuring Link-State Tracking Displaying Link-State Tracking Status Use the show link state...

  • Page 823: Configuring IP Unicast Routing

    CH A P T E R 38 Configuring IP Unicast Routing This chapter describes how to configure IP Version...

  • Page 824

    Chapter 38 Configuring IP Unicast Routing Understanding IP Routing Note When configuring routing parameters on the switch and to...

  • Page 825

    Chapter 38 Configuring IP Unicast Routing Understanding IP Routing Default routing refers to sending traffic with a destination unknown to...

  • Page 826

    Chapter 38 Configuring IP Unicast Routing Understanding IP Routing Stack members perform these functions: • They act as routing...

  • Page 827

    Chapter 38 Configuring IP Unicast Routing Steps for Configuring Routing Steps for Configuring Routing By default, IP routing is disabled...

  • Page 828

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing • Configuring Address Resolution Methods, page 38-9 • Routing Assistance...

  • Page 829

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Assigning IP Addresses to Network Interfaces An IP address identifies a...

  • Page 830

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Classless Routing By default, classless routing behavior is enabled on...

  • Page 831

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Figure 38-3 No IP Classless Routing 128.0.0.0/8 128.20.4.1 128.20.0.0 Bit bucket...

  • Page 832

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing The switch can use these forms of address resolution: •...

  • Page 833

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Command Purpose Step 3 arp ip-address hardware-address type [alias] (Optional) Specify...

  • Page 834

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Enable Proxy ARP By default, the switch uses proxy ARP...

  • Page 835

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Beginning in privileged EXEC mode, follow these steps to define a...

  • Page 836

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Command Purpose Step 6 ip irdp maxadvertinterval seconds (Optional) Set...

  • Page 837

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Enabling Directed Broadcast-to-Physical Broadcast Translation By default, IP directed broadcasts are...

  • Page 838

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Forwarding UDP Broadcast Packets and Protocols User Datagram Protocol (UDP)...

  • Page 839

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Establishing an IP Broadcast Address The most popular IP broadcast address...

  • Page 840

    Chapter 38 Configuring IP Unicast Routing Configuring IP Addressing Beginning in privileged EXEC mode, follow these steps to use...

  • Page 841

    Chapter 38 Configuring IP Unicast Routing Enabling IP Unicast Routing Table 38-3 Commands to Display Caches, Tables, and Databases Command...

  • Page 842

    Chapter 38 Configuring IP Unicast Routing Configuring RIP Switch(config-router)# network 10.0.0.0 Switch(config-router)# end You can now set up parameters...

  • Page 843

    Chapter 38 Configuring IP Unicast Routing Configuring RIP Default RIP Configuration Table 38-4 shows the default RIP configuration. Table 38-4...

  • Page 844

    Chapter 38 Configuring IP Unicast Routing Configuring RIP Command Purpose Step 4 network network number Associate a network with...

  • Page 845

    Chapter 38 Configuring IP Unicast Routing Configuring RIP To turn off the RIP routing process, use the no router rip...

  • Page 846

    Chapter 38 Configuring IP Unicast Routing Configuring RIP If you want to configure an interface running RIP to advertise...

  • Page 847

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF Configuring Split Horizon Routers connected to broadcast-type IP networks and using distance-vector...

  • Page 848

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF • Plain text and MD5 authentication among neighboring routers within an...

  • Page 849

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF Table 38-5 Default OSPF Configuration Feature Default Setting Interface parameters Cost: No...

  • Page 850

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF Table 38-5 Default OSPF Configuration (continued) Feature Default Setting Timers LSA...

  • Page 851

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF After a stack master change, the new master sends an OSPF NSF...

  • Page 852

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF To end an OSPF routing process, use the no router ospf...

  • Page 853

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF Command Purpose Step 11 ip ospf database-filter all out (Optional) Block flooding...

  • Page 854

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF Command Purpose Step 5 area area-id stub [no-summary] (Optional) Define an...

  • Page 855

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF • Default Metrics: OSPF calculates the OSPF metric for an interface according...

  • Page 856

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF Beginning in privileged EXEC mode, follow these steps to configure these...

  • Page 857

    Chapter 38 Configuring IP Unicast Routing Configuring OSPF Changing LSA Group Pacing The OSPF LSA group pacing feature allows the...

  • Page 858

    Chapter 38 Configuring IP Unicast Routing Configuring EIGRP Monitoring OSPF You can display specific statistics such as the contents...

  • Page 859

    Chapter 38 Configuring IP Unicast Routing Configuring EIGRP EIGRP offers these features: • Fast convergence. • Incremental updates when the...

  • Page 860

    Chapter 38 Configuring IP Unicast Routing Configuring EIGRP • Configuring EIGRP Route Authentication, page 38-42 • EIGRP Stub Routing,...

  • Page 861

    Chapter 38 Configuring IP Unicast Routing Configuring EIGRP Table 38-7 Default EIGRP Configuration (continued) Feature Default Setting 1 NSF Awareness...

  • Page 862

    Chapter 38 Configuring IP Unicast Routing Configuring EIGRP EIGRP NSF Capability The IP-services feature set also supports EIGRP NSF-capable...

  • Page 863

    Chapter 38 Configuring IP Unicast Routing Configuring EIGRP Command Purpose Step 6 metric weights tos k1 k2 k3 k4 k5...

  • Page 864

    Chapter 38 Configuring IP Unicast Routing Configuring EIGRP Command Purpose Step 5 ip hello-interval eigrp autonomous-system-number (Optional) Change the...

  • Page 865

    Chapter 38 Configuring IP Unicast Routing Configuring EIGRP Command Purpose Step 9 accept-lifetime start-time {infinite | end-time | duration (Optional)...

  • Page 866

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Figure 38-4 EIGRP Stub Router Configuration Routed to WAN Switch A...

  • Page 867

    Chapter 38 Configuring IP Unicast Routing Configuring BGP For details about BGP commands and keywords, see the “IP Routing Protocols”...

  • Page 868

    Chapter 38 Configuring IP Unicast Routing Configuring BGP In BGP, each route consists of a network number, a list...

  • Page 869

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Table 38-9 Default BGP Configuration Feature Default Setting Aggregate address Disabled: None...

  • Page 870

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Table 38-9 Default BGP Configuration (continued) Feature Default Setting Neighbor •...

  • Page 871

    Chapter 38 Configuring IP Unicast Routing Configuring BGP neighboring router during the interval between the primary Route Processor (RP) in...

  • Page 872

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Command Purpose Step 5 neighbor {ip-address | peer-group-name} Add an entry...

  • Page 873

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Router B: Switch(config)# router bgp 200 Switch(config-router)# neighbor 129.213.1.2 remote-as 100 Switch(config-router)#...

  • Page 874

    Chapter 38 Configuring IP Unicast Routing Configuring BGP establish a TCP session. A soft reset allows the dynamic exchange...

  • Page 875

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Configuring BGP Decision Attributes When a BGP speaker receives updates from multiple...

  • Page 876

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Beginning in privileged EXEC mode, follow these steps to configure some...

  • Page 877

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Command Purpose Step 14 show ip bgp Verify the reset by checking...

  • Page 878

    Chapter 38 Configuring IP Unicast Routing Configuring BGP path, community, and network numbers. Autonomous system path matching requires the...

  • Page 879

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Configuring Prefix Lists for BGP Filtering You can use prefix lists as...

  • Page 880

    Chapter 38 Configuring IP Unicast Routing Configuring BGP sequence number command; to reenable automatic generation, use the ip prefix-list...

  • Page 881

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Command Purpose Step 5 set comm-list list-num delete (Optional) Remove communities from...

  • Page 882

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Command Purpose Step 7 neighbor {ip-address | peer-group-name} (Optional) Allow a...

  • Page 883

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Command Purpose Step 23 neighbor {ip-address | peer-group-name} (Optional) Configure the software...

  • Page 884

    Chapter 38 Configuring IP Unicast Routing Configuring BGP To delete an aggregate entry, use the no aggregate-address address mask...

  • Page 885

    Chapter 38 Configuring IP Unicast Routing Configuring BGP When the route reflector receives an advertised route, it takes one of...

  • Page 886

    Chapter 38 Configuring IP Unicast Routing Configuring BGP Beginning in privileged EXEC mode, use these commands to configure BGP...

  • Page 887

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Table 38-11 IP BGP Clear and Show Commands (continued) Command Purpose...

  • Page 888

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE These sections contain this information: • Understanding Multi-VRF CE, page...

  • Page 889

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Figure 38-6 shows a configuration using switches as multiple virtual CEs....

  • Page 890

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE To configure VRF, you create a VRF table and specify...

  • Page 891

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE • A customer can use multiple VLANs as long as they...

  • Page 892

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Command Purpose Step 9 end Return to privileged EXEC mode....

  • Page 893

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE User Interface for PING Beginning in privileged EXEC mode, follow these...

  • Page 894

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Command Purpose Step 6 standby 1 ip ip-address Enable HSRP...

  • Page 895

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE User Interface for Traceroute Beginning in privileged EXEC mode, follow these...

  • Page 896

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Configuring Multicast VRFs Beginning in privileged EXEC mode, follow these...

  • Page 897

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Beginning in privileged EXEC mode, follow these steps to configure OSPF...

  • Page 898

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Use the no router bgp autonomous-system-number global configuration command to...

  • Page 899

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Configuring Switch A On Switch A, enable routing and configure VRF....

  • Page 900

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Switch(config)# interface vlan118 Switch(config-if)# ip vrf forwarding v12 Switch(config-if)# ip...

  • Page 901

    Chapter 38 Configuring IP Unicast Routing Configuring Multi-VRF CE Configuring Switch F Switch F belongs to VPN 2. Configure the...

  • Page 902

    Chapter 38 Configuring IP Unicast Routing Configuring Unicast Reverse Path Forwarding Router(config)# router bgp 100 Router(config-router)# address-family ipv4 vrf...

  • Page 903

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Configuring Protocol-Independent Features This section describes how to configure IP routing...

  • Page 904

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features The default configuration is CEF or dCEF enabled on all...

  • Page 905

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Even though the router automatically learns about and configures equal-cost routes,...

  • Page 906

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Table 38-14 Dynamic Routing Protocol Default Administrative Distances Route Source...

  • Page 907

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Command Purpose Step 4 show ip route Display the selected default...

  • Page 908

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Note Although each of Steps 3 through 14 in the...

  • Page 909

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Command Purpose Step 12 set dampening halflife reuse suppress Set BGP...

  • Page 910

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Beginning in privileged EXEC mode, follow these steps to control...

  • Page 911

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features With PBR, you classify traffic using access control lists (ACLs) and...

  • Page 912

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features • To use PBR, you must first enable the routing...

  • Page 913

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Beginning in privileged EXEC mode, follow these steps to configure PBR:...

  • Page 914

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Command Purpose Step 11 end Return to privileged EXEC mode....

  • Page 915

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features Command Purpose Step 7 end Return to privileged EXEC mode. Step...

  • Page 916

    Chapter 38 Configuring IP Unicast Routing Configuring Protocol-Independent Features router to intelligently discriminate between sources of routing information. The...

  • Page 917

    Chapter 38 Configuring IP Unicast Routing Monitoring and Maintaining the IP Network Beginning in privileged EXEC mode, follow these steps...

  • Page 918

    Chapter 38 Configuring IP Unicast Routing Monitoring and Maintaining the IP Network Table 38-15 Commands to Clear IP Routes...

  • Page 919: Configuring IPv6 Unicast Routing

    CH A P T E R 39 Configuring IPv6 Unicast Routing Internet Protocol Version 6 (IPv6) is the network-layer...

  • Page 920

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 The architecture of IPv6 allows existing IPv4 users to transition easily...

  • Page 921

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 For more information about IPv6 address formats, address types, and the IPv6...

  • Page 922

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 • Link local unicast addresses can be automatically configured on any...

  • Page 923

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 A value of 137 in the ICMP packet header Type field identifies...

  • Page 924

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 The switch uses hardware memory to store unicast routes, MAC addresses,...

  • Page 925

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 Passive Interfaces As with EIGRP IPv4, EIGRP IPv6 allows you to specify...

  • Page 926

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 Table 39-2 EIGRP IPv6 Router-mode Commands (continued) Command Purpose metric weights...

  • Page 927

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 For complete syntax and usage information on these commands, see the Cisco...

  • Page 928

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 • In addition to the normal SPAN and RSPAN limitations defined...

  • Page 929

    Chapter 39 Configuring IPv6 Unicast Routing Understanding IPv6 Note IPv6 packets are routed in hardware across the stack provided the...

  • Page 930

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 • Dual IPv4 and IPv6 VLAN template—supports basic Layer 2, multicast,...

  • Page 931

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 Default IPv6 Configuration Table 39-5 shows the default IPv6 configuration. Table 39-5...

  • Page 932

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 Beginning in privileged EXEC mode, follow these steps to assign an...

  • Page 933

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 without arguments. To disable IPv6 processing on an interface that has not...

  • Page 934

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 Command Purpose Step 4 interface interface-id Enter interface configuration mode, and...

  • Page 935

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 Configuring IPv6 ICMP Rate Limiting IPv6 ICMP rate limiting uses a token-bucket...

  • Page 936

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 To disable IPv6 CEF or distributed CEF, use the no ipv6...

  • Page 937

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 Beginning in privileged EXEC mode, follow these steps to configure an IPv6...

  • Page 938

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 Command Purpose Step 4 show ipv6 static [ipv6-address | Verify your...

  • Page 939

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 Beginning in privileged EXEC mode, follow these required and optional steps to...

  • Page 940

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 Configuring OSPF for IPv6 Open Shortest Path First (OSPF) is a...

  • Page 941

    Chapter 39 Configuring IPv6 Unicast Routing Configuring IPv6 Beginning in privileged EXEC mode, follow these required and optional steps to...

  • Page 942

    Chapter 39 Configuring IPv6 Unicast Routing Displaying IPv6 To disable an OSPF routing process, use the no ipv6 router...

  • Page 943

    Chapter 39 Configuring IPv6 Unicast Routing Displaying IPv6 ND router advertisements are sent every 200 seconds ND router advertisements live...

  • Page 944

    Chapter 39 Configuring IPv6 Unicast Routing Displaying IPv6 This is an example of the output from the show ipv6...

  • Page 945

    Chapter 39 Configuring IPv6 Unicast Routing Displaying IPv6 ICMP statistics: Rcvd: 1 input, 0 checksum errors, 0 too short 0...

  • Page 946

    Chapter 39 Configuring IPv6 Unicast Routing Displaying IPv6 Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 39-28...

  • Page 947: Configuring HSRP

    CH A P T E R 40 Configuring HSRP This chapter describes how to use Hot Standby Router Protocol...

  • Page 948

    Chapter 40 Configuring HSRP Understanding HSRP HSRP is useful for hosts that do not support a router discovery protocol...

  • Page 949

    Chapter 40 Configuring HSRP Understanding HSRP Figure 40-1 Typical HSRP Configuration Blade server B 172.20.130.5 Active Virtual Standby router router...

  • Page 950

    Chapter 40 Configuring HSRP Configuring HSRP Figure 40-2 MHSRP Load Sharing Active router for group 1 Active router for...

  • Page 951

    Chapter 40 Configuring HSRP Configuring HSRP • Enabling HSRP Support for ICMP Redirect Messages, page 40-11 • Configuring HSRP Groups...

  • Page 952

    Chapter 40 Configuring HSRP Configuring HSRP When the standby ip command is enabled on an interface and proxy ARP...

  • Page 953

    Chapter 40 Configuring HSRP Configuring HSRP Configuring HSRP Priority The standby priority, standby preempt, and standby track interface configuration commands...

  • Page 954

    Chapter 40 Configuring HSRP Configuring HSRP Command Purpose Step 3 standby [group-number] priority Set a priority value used in...

  • Page 955

    Chapter 40 Configuring HSRP Configuring HSRP This example activates a port, sets an IP address and a priority of 120...

  • Page 956

    Chapter 40 Configuring HSRP Configuring HSRP When configuring these attributes, follow these guidelines: • The authentication string is sent...

  • Page 957

    Chapter 40 Configuring HSRP Displaying HSRP Configurations This example shows how to set the timers on standby group 1 with...

  • Page 958

    Chapter 40 Configuring HSRP Displaying HSRP Configurations This is a an example of output from the show standby privileged...

  • Page 959: Configuring Cisco IOS IP SLAs Operations

    CH A P T E R 41 Configuring Cisco IOS IP SLAs Operations This chapter describes how to use...

  • Page 960

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Understanding Cisco IOS IP SLAs options such as source and destination...

  • Page 961

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Understanding Cisco IOS IP SLAs Using Cisco IOS IP SLAs to Measure...

  • Page 962

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Understanding Cisco IOS IP SLAs IP SLAs Responder and IP SLAs...

  • Page 963

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Understanding Cisco IOS IP SLAs Figure 41-2 Cisco IOS IP SLAs Responder...

  • Page 964

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Configuring IP SLAs Operations • One-way mean opinion score (MOS) •...

  • Page 965

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Configuring IP SLAs Operations Note that not all of the IP SLAs...

  • Page 966

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Configuring IP SLAs Operations Configuring the IP SLAs Responder The IP...

  • Page 967

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Configuring IP SLAs Operations • Per-direction delay (one-way delay) • Round-trip delay...

  • Page 968

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Configuring IP SLAs Operations Command Purpose Step 3 udp-jitter {destination-ip-address Configure...

  • Page 969

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Configuring IP SLAs Operations Command Purpose Step 7 end Return to privileged...

  • Page 970

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Configuring IP SLAs Operations Note This operation does not require the...

  • Page 971

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Configuring IP SLAs Operations Command Purpose Step 8 show ip sla configuration...

  • Page 972

    Chapter 41 Configuring Cisco IOS IP SLAs Operations Monitoring IP SLAs Operations Monitoring IP SLAs Operations Use the user...

  • Page 973: Configuring Enhanced Object Tracking

    CH A P T E R 42 Configuring Enhanced Object Tracking This chapter describes how to configure enhanced object...

  • Page 974

    Chapter 42 Configuring Enhanced Object Tracking Configuring Enhanced Object Tracking Features Configuring Enhanced Object Tracking Features These sections describe...

  • Page 975

    Chapter 42 Configuring Enhanced Object Tracking Configuring Enhanced Object Tracking Features Command Purpose Step 6 delay {up seconds [down seconds]...

  • Page 976

    Chapter 42 Configuring Enhanced Object Tracking Configuring Enhanced Object Tracking Features Beginning in privileged EXEC mode, follow these steps...

  • Page 977

    Chapter 42 Configuring Enhanced Object Tracking Configuring Enhanced Object Tracking Features Beginning in privileged EXEC mode, follow these steps to...

  • Page 978

    Chapter 42 Configuring Enhanced Object Tracking Configuring Enhanced Object Tracking Features Beginning in privileged EXEC mode, follow these steps...

  • Page 979

    Chapter 42 Configuring Enhanced Object Tracking Configuring Enhanced Object Tracking Features Configuring HSRP Object Tracking Beginning in privileged EXEC mode,...

  • Page 980

    Chapter 42 Configuring Enhanced Object Tracking Configuring Enhanced Object Tracking Features Command Purpose Step 6 standby [group-number] track Configure...

  • Page 981

    Chapter 42 Configuring Enhanced Object Tracking Configuring Enhanced Object Tracking Features Configuring IP SLAs Object Tracking Cisco IOS IP Service...

  • Page 982

    Chapter 42 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking Latest operation return code: over threshold Latest RTT (millisecs)...

  • Page 983

    Chapter 42 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide...

  • Page 984

    Chapter 42 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking Cisco Catalyst Blade Switch 3130 for Dell Software Configuration...

  • Page 985: Configuring Web Cache Services By Using WCCP

    CH A P T E R 43 Configuring Web Cache Services By Using WCCP This chapter describes how to...

  • Page 986

    Chapter 43 Configuring Web Cache Services By Using WCCP Understanding WCCP When an application engine receives a request, it...

  • Page 987

    Chapter 43 Configuring Web Cache Services By Using WCCP Understanding WCCP WCCP Negotiation In the exchange of WCCP protocol messages,...

  • Page 988

    Chapter 43 Configuring Web Cache Services By Using WCCP Understanding WCCP You can configure up to 8 service groups...

  • Page 989

    Chapter 43 Configuring Web Cache Services By Using WCCP Configuring WCCP Unsupported WCCP Features These WCCP features are not supported...

  • Page 990

    Chapter 43 Configuring Web Cache Services By Using WCCP Configuring WCCP • The number of available policy-based routing (PBR)...

  • Page 991

    Chapter 43 Configuring Web Cache Services By Using WCCP Configuring WCCP Command Purpose Step 1 configure terminal Enter global configuration...

  • Page 992

    Chapter 43 Configuring Web Cache Services By Using WCCP Configuring WCCP Command Purpose Step 16 show ip wccp web-cache...

  • Page 993

    Chapter 43 Configuring Web Cache Services By Using WCCP Monitoring and Maintaining WCCP This example shows how to configure SVIs...

  • Page 994

    Chapter 43 Configuring Web Cache Services By Using WCCP Monitoring and Maintaining WCCP Table 43-2 Commands for Monitoring and...

  • Page 995: Configuring IP Multicast Routing

    CH A P T E R 44 Configuring IP Multicast Routing This chapter describes how to configure IP multicast...

  • Page 996

    Chapter 44 Configuring IP Multicast Routing Understanding Cisco’s Implementation of IP Multicast Routing Understanding Cisco’s Implementation of IP Multicast...

  • Page 997

    Chapter 44 Configuring IP Multicast Routing Understanding Cisco’s Implementation of IP Multicast Routing Understanding IGMP To participate in IP multicasting,...

  • Page 998

    Chapter 44 Configuring IP Multicast Routing Understanding Cisco’s Implementation of IP Multicast Routing Understanding PIM PIM is called protocol-independent:...

  • Page 999

    Chapter 44 Configuring IP Multicast Routing Understanding Cisco’s Implementation of IP Multicast Routing When a new receiver on a previously...

  • Page 1000

    Chapter 44 Configuring IP Multicast Routing Understanding Cisco’s Implementation of IP Multicast Routing The redundant PIM stub router topology...

  • Page 1001

    Chapter 44 Configuring IP Multicast Routing Understanding Cisco’s Implementation of IP Multicast Routing Mapping agents listen to these candidate RP...

  • Page 1002

    Chapter 44 Configuring IP Multicast Routing Understanding Cisco’s Implementation of IP Multicast Routing With multicasting, the source is sending...

  • Page 1003

    Chapter 44 Configuring IP Multicast Routing Multicast Routing and Switch Stacks Sparse-mode PIM uses the RPF lookup function to decide...

  • Page 1004

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing In a switch stack, the routing master (stack master)...

  • Page 1005

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Table 44-2 Default Multicast Routing Configuration Feature Default Setting Multicast...

  • Page 1006

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Sparse-mode groups in a mixed PIMv1 and PIMv2 region...

  • Page 1007

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing In populating the multicast routing table, dense-mode interfaces are always...

  • Page 1008

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Command Purpose Step 5 ip pim {dense-mode | sparse-mode...

  • Page 1009

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Enabling PIM Stub Routing Beginning in privileged EXEC mode, follow...

  • Page 1010

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing • show ip igmp detail displays the interested clients...

  • Page 1011

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Beginning in privileged EXEC mode, follow these steps to manually...

  • Page 1012

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Configuring Auto-RP Auto-RP uses IP multicast to automate the...

  • Page 1013

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Beginning in privileged EXEC mode, follow these steps to deploy...

  • Page 1014

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Command Purpose Step 5 ip pim send-rp-discovery scope ttl...

  • Page 1015

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Beginning in privileged EXEC mode, follow these steps to filter...

  • Page 1016

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Switch(config)# access-list 20 deny 239.0.0.0 0.0.255.255 Switch(config)# access-list 20...

  • Page 1017

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Figure 44-4 Constraining PIMv2 BSR Messages PIMv2 sparse-mode Configure the...

  • Page 1018

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing This example shows a portion of an IP multicast...

  • Page 1019

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing Configuring Candidate RPs You can configure one or more candidate...

  • Page 1020

    Chapter 44 Configuring IP Multicast Routing Configuring IP Multicast Routing This example shows how to configure the switch to...

  • Page 1021

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced PIM Features Monitoring the RP Mapping Information To monitor the RP mapping...

  • Page 1022

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced PIM Features Figure 44-5 Shared Tree and Source Tree (Shortest-Path Tree)...

  • Page 1023

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced PIM Features Delaying the Use of PIM Shortest-Path Tree The change from...

  • Page 1024

    Chapter 44 Configuring IP Multicast Routing Configuring Optional IGMP Features Command Purpose Step 4 end Return to privileged EXEC...

  • Page 1025

    Chapter 44 Configuring IP Multicast Routing Configuring Optional IGMP Features • Modifying the IGMP Host-Query Message Interval, page 44-33 (optional)...

  • Page 1026

    Chapter 44 Configuring IP Multicast Routing Configuring Optional IGMP Features Command Purpose Step 4 end Return to privileged EXEC...

  • Page 1027

    Chapter 44 Configuring IP Multicast Routing Configuring Optional IGMP Features Command Purpose Step 7 show ip igmp interface [interface-id] Verify...

  • Page 1028

    Chapter 44 Configuring IP Multicast Routing Configuring Optional IGMP Features The switch elects a PIM designated router (DR) for...

  • Page 1029

    Chapter 44 Configuring IP Multicast Routing Configuring Optional IGMP Features Command Purpose Step 5 show ip igmp interface [interface-id] Verify...

  • Page 1030

    Chapter 44 Configuring IP Multicast Routing Configuring Optional Multicast Routing Features Beginning in privileged EXEC mode, follow these steps...

  • Page 1031

    Chapter 44 Configuring IP Multicast Routing Configuring Optional Multicast Routing Features Command Purpose Step 3 ip cgmp [proxy] Enable CGMP...

  • Page 1032

    Chapter 44 Configuring IP Multicast Routing Configuring Optional Multicast Routing Features Enabling sdr Listener Support By default, the switch...

  • Page 1033

    Chapter 44 Configuring IP Multicast Routing Configuring Optional Multicast Routing Features Configuring an IP Multicast Boundary Administratively-scoped boundaries can be...

  • Page 1034

    Chapter 44 Configuring IP Multicast Routing Configuring Basic DVMRP Interoperability Features Beginning in privileged EXEC mode, follow these steps...

  • Page 1035

    Chapter 44 Configuring IP Multicast Routing Configuring Basic DVMRP Interoperability Features Configuring DVMRP Interoperability Cisco multicast routers and multilayer switches...

  • Page 1036

    Chapter 44 Configuring IP Multicast Routing Configuring Basic DVMRP Interoperability Features Command Purpose Step 4 ip dvmrp metric metric...

  • Page 1037

    Chapter 44 Configuring IP Multicast Routing Configuring Basic DVMRP Interoperability Features Configuring a DVMRP Tunnel The software supports DVMRP tunnels...

  • Page 1038

    Chapter 44 Configuring IP Multicast Routing Configuring Basic DVMRP Interoperability Features Command Purpose Step 9 ip dvmrp accept-filter Configure...

  • Page 1039

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced DVMRP Interoperability Features Beginning in privileged EXEC mode, follow these steps to...

  • Page 1040

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced DVMRP Interoperability Features These sections contain this configuration information: • Enabling...

  • Page 1041

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced DVMRP Interoperability Features Rejecting a DVMRP Nonpruning Neighbor By default, Cisco devices...

  • Page 1042

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced DVMRP Interoperability Features Figure 44-8 Router Rejects Nonpruning DVMRP Neighbor Source...

  • Page 1043

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced DVMRP Interoperability Features Controlling Route Exchanges These sections describe how to tune...

  • Page 1044

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced DVMRP Interoperability Features Beginning in privileged EXEC mode, follow these steps...

  • Page 1045

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced DVMRP Interoperability Features Figure 44-9 On Connected Unicast Routes Are Advertised by...

  • Page 1046

    Chapter 44 Configuring IP Multicast Routing Configuring Advanced DVMRP Interoperability Features Disabling DVMRP Autosummarization By default, the software automatically...

  • Page 1047

    Chapter 44 Configuring IP Multicast Routing Monitoring and Maintaining IP Multicast Routing Command Purpose Step 3 ip dvmrp metric-offset [in...

  • Page 1048

    Chapter 44 Configuring IP Multicast Routing Monitoring and Maintaining IP Multicast Routing Table 44-4 Commands for Clearing Caches, Tables,...

  • Page 1049

    Chapter 44 Configuring IP Multicast Routing Monitoring and Maintaining IP Multicast Routing Table 44-5 Commands for Displaying System and Network...

  • Page 1050

    Chapter 44 Configuring IP Multicast Routing Monitoring and Maintaining IP Multicast Routing Cisco Catalyst Blade Switch 3130 for Dell...

  • Page 1051: Configuring MSDP

    CH A P T E R 45 Configuring MSDP This chapter describes how to configure the Multicast Source Discovery...

  • Page 1052

    Chapter 45 Configuring MSDP Understanding MSDP The purpose of this topology is to have domains discover multicast sources in...

  • Page 1053

    Chapter 45 Configuring MSDP Understanding MSDP Figure 45-1 MSDP Running Between RP Peers RP + MSDP peer MSDP peer MSDP...

  • Page 1054

    Chapter 45 Configuring MSDP Configuring MSDP Configuring MSDP These sections contain this configuration information: • Default MSDP Configuration, page...

  • Page 1055

    Chapter 45 Configuring MSDP Configuring MSDP Figure 45-2 Default MSDP Peer Network Router C Default MSDP peer ISP C PIM...

  • Page 1056

    Chapter 45 Configuring MSDP Configuring MSDP Command Purpose Step 3 ip prefix-list name [description string] | (Optional) Create a...

  • Page 1057

    Chapter 45 Configuring MSDP Configuring MSDP Beginning in privileged EXEC mode, follow these steps to enable the caching of source/group...

  • Page 1058

    Chapter 45 Configuring MSDP Configuring MSDP Requesting Source Information from an MSDP Peer Local RPs can send SA requests...

  • Page 1059

    Chapter 45 Configuring MSDP Configuring MSDP Controlling Source Information that Your Switch Originates You can control the multicast source information...

  • Page 1060

    Chapter 45 Configuring MSDP Configuring MSDP Command Purpose Step 3 access-list access-list-number {deny | Create an IP standard access...

  • Page 1061

    Chapter 45 Configuring MSDP Configuring MSDP Filtering Source-Active Request Messages By default, only switches that are caching SA information can...

  • Page 1062

    Chapter 45 Configuring MSDP Configuring MSDP Controlling Source Information that Your Switch Forwards By default, the switch forwards all...

  • Page 1063

    Chapter 45 Configuring MSDP Configuring MSDP Command Purpose Step 3 access-list access-list-number {deny | (Optional) Create an IP extended access...

  • Page 1064

    Chapter 45 Configuring MSDP Configuring MSDP Using TTL to Limit the Multicast Data Sent in SA Messages You can...

  • Page 1065

    Chapter 45 Configuring MSDP Configuring MSDP Beginning in privileged EXEC mode, follow these steps to apply a filter. This procedure...

  • Page 1066

    Chapter 45 Configuring MSDP Configuring MSDP Configuring an MSDP Mesh Group An MSDP mesh group is a group of...

  • Page 1067

    Chapter 45 Configuring MSDP Configuring MSDP Beginning in privileged EXEC mode, follow these steps to shut down a peer. This...

  • Page 1068

    Chapter 45 Configuring MSDP Configuring MSDP Command Purpose Step 5 show running-config Verify your entries. Step 6 copy running-config...

  • Page 1069

    Chapter 45 Configuring MSDP Monitoring and Maintaining MSDP Monitoring and Maintaining MSDP To monitor MSDP SA messages, peers, state, or...

  • Page 1070

    Chapter 45 Configuring MSDP Monitoring and Maintaining MSDP Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 45-20...

  • Page 1071: Configuring Fallback Bridging

    CH A P T E R 46 Configuring Fallback Bridging This chapter describes how to configure fallback bridging (VLAN...

  • Page 1072

    Chapter 46 Configuring Fallback Bridging Understanding Fallback Bridging A VLAN bridge domain is represented with switch virtual interfaces (SVIs)....

  • Page 1073

    Chapter 46 Configuring Fallback Bridging Configuring Fallback Bridging Figure 46-1 Fallback Bridging Network Example Routed port Layer 3 switch 172.20.130.1...

  • Page 1074

    Chapter 46 Configuring Fallback Bridging Configuring Fallback Bridging Table 46-1 Default Fallback Bridging Configuration Feature Default Setting Bridge groups...

  • Page 1075

    Chapter 46 Configuring Fallback Bridging Configuring Fallback Bridging Beginning in privileged EXEC mode, follow these steps to create a bridge...

  • Page 1076

    Chapter 46 Configuring Fallback Bridging Configuring Fallback Bridging Switch(config-if)# bridge-group 10 Switch(config-if)# exit Adjusting Spanning-Tree Parameters You might need...

  • Page 1077

    Chapter 46 Configuring Fallback Bridging Configuring Fallback Bridging To return to the default setting, use the no bridge bridge-group priority...

  • Page 1078

    Chapter 46 Configuring Fallback Bridging Configuring Fallback Bridging Command Purpose Step 3 bridge-group bridge-group path-cost Assign the path cost...

  • Page 1079

    Chapter 46 Configuring Fallback Bridging Configuring Fallback Bridging Command Purpose Step 4 show running-config Verify your entry. Step 5 copy...

  • Page 1080

    Chapter 46 Configuring Fallback Bridging Configuring Fallback Bridging Beginning in privileged EXEC mode, follow these steps to change the...

  • Page 1081

    Chapter 46 Configuring Fallback Bridging Monitoring and Maintaining Fallback Bridging Monitoring and Maintaining Fallback Bridging To monitor and maintain the...

  • Page 1082

    Chapter 46 Configuring Fallback Bridging Monitoring and Maintaining Fallback Bridging Cisco Catalyst Blade Switch 3130 for Dell Software Configuration...

  • Page 1083: Troubleshooting

    CH A P T E R 47 Troubleshooting This chapter describes how to identify and resolve software problems related...

  • Page 1084

    Chapter 47 Troubleshooting Recovering from a Software Failure Recovering from a Software Failure Switch software can be corrupted during...

  • Page 1085

    Chapter 47 Troubleshooting Recovering from a Lost or Forgotten Password You can release the Mode button after the system LED...

  • Page 1086

    Chapter 47 Troubleshooting Recovering from a Lost or Forgotten Password You enable or disable password recovery by using the...

  • Page 1087

    Chapter 47 Troubleshooting Recovering from a Lost or Forgotten Password slot <stack-master-member-number> Proceed with reload? [confirm] y Step 6 For...

  • Page 1088

    Chapter 47 Troubleshooting Recovering from a Lost or Forgotten Password Note Before continuing to Step 9, power on any...

  • Page 1089

    Chapter 47 Troubleshooting Recovering from a Lost or Forgotten Password Would you like to reset the system back to the...

  • Page 1090

    Chapter 47 Troubleshooting Preventing Switch Stack Problems Note Before continuing to Step 9, power on any connected stack members...

  • Page 1091

    Chapter 47 Troubleshooting Preventing Autonegotiation Mismatches Removing powered-on stack members causes the switch stack to divide (partition) into two or...

  • Page 1092

    Chapter 47 Troubleshooting Monitoring SFP Module Status error-disabled state. After the elapsed interval, the switch brings the interface out...

  • Page 1093

    Chapter 47 Troubleshooting Using Ping Executing Ping If you attempt to ping a host in a different IP subnetwork, you...

  • Page 1094

    Chapter 47 Troubleshooting Using Layer 2 Traceroute Using Layer 2 Traceroute These sections contain this information: • Understanding Layer...

  • Page 1095

    Chapter 47 Troubleshooting Using IP Traceroute • The traceroute mac ip command output shows the Layer 2 path when the...

  • Page 1096

    Chapter 47 Troubleshooting Using IP Traceroute of 1 or 0, it drops the datagram and sends an Internet Control...

  • Page 1097

    Chapter 47 Troubleshooting Using TDR Table 47-2 Traceroute Output Display Characters (continued) Character Description A Administratively unreachable. Usually, this output...

  • Page 1098

    Chapter 47 Troubleshooting Using Debug Commands • The open-ended cable is not terminated. When you run TDR, the switch...

  • Page 1099

    Chapter 47 Troubleshooting Using Debug Commands All debug commands are entered in privileged EXEC mode, and most debug commands take...

  • Page 1100

    Chapter 47 Troubleshooting Using the show platform forward Command Note Be aware that the debugging destination you use affects...

  • Page 1101

    Chapter 47 Troubleshooting Using the show platform forward Command Gi1/0/1 0005 0001.0001.0001 0002.0002.0002 ------------------------------------------ Packet 2 Lookup Key-Used Index-Hit A-Data...

  • Page 1102

    Chapter 47 Troubleshooting Using the crashinfo Files This is an example of the output when the packet coming in...

  • Page 1103

    Chapter 47 Troubleshooting Using On-Board Failure Logging file is created, you can use the rename privileged EXEC command to rename...

  • Page 1104

    Chapter 47 Troubleshooting Using On-Board Failure Logging • Uptime data—Time when a standalone switch or a stack member starts,...

  • Page 1105

    Chapter 47 Troubleshooting Using On-Board Failure Logging Table 47-3 Commands for Displaying OBFL Information (continued) Command Purpose show logging onboard...

  • Page 1106

    Chapter 47 Troubleshooting Using On-Board Failure Logging Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide 47-24 OL-13270-01...

  • Page 1107: Configuring Online Diagnostics

    CH A P T E R 48 Configuring Online Diagnostics This chapter describes how to configure the online diagnostics...

  • Page 1108

    Chapter 48 Configuring Online Diagnostics Configuring Online Diagnostics Configuring Online Diagnostics You must configure the failure threshold and the...

  • Page 1109

    Chapter 48 Configuring Online Diagnostics Configuring Online Diagnostics This example shows how to schedule diagnostic testing to occur weekly at...

  • Page 1110

    Chapter 48 Configuring Online Diagnostics Configuring Online Diagnostics Command Purpose Step 4 diagnostic monitor threshold switch (Optional) Set the...

  • Page 1111

    Chapter 48 Configuring Online Diagnostics Running Online Diagnostic Tests • To configure the switch to not generate a syslog message...

  • Page 1112

    Chapter 48 Configuring Online Diagnostics Running Online Diagnostic Tests This example shows how to start a diagnostic test by...

  • Page 1113: Supported MIBs

    A P P E N D I X A Supported MIBs This appendix lists the supported management information base...

  • Page 1114

    Appendix A Supported MIBs MIB List • CISCO-IETF-ISIS-MIB (Only with the IP services and advanced IP services feature sets)...

  • Page 1115

    Appendix A Supported MIBs MIB List • IEEE8023-LAG-MIB • IF-MIB (In and out counters for VLANs are not supported.) •...

  • Page 1116

    Appendix A Supported MIBs Using FTP to Access the MIB Files Using FTP to Access the MIB Files You...

  • Page 1117: Working with the Cisco IOS File System, Configuration Files, and Software Images

    A P P E N D I X B Working with the Cisco IOS File System, Configuration Files, and...

  • Page 1118

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File...

  • Page 1119

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System...

  • Page 1120

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File...

  • Page 1121

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System...

  • Page 1122

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File...

  • Page 1123

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System...

  • Page 1124

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File...

  • Page 1125

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files service linenumber...

  • Page 1126

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Guidelines...

  • Page 1127

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Creating a...

  • Page 1128

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files •...

  • Page 1129

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Step 3...

  • Page 1130

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files These...

  • Page 1131

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Command Purpose...

  • Page 1132

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Command...

  • Page 1133

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files The RCP...

  • Page 1134

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Downloading...

  • Page 1135

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Uploading a...

  • Page 1136

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Clearing...

  • Page 1137

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files You use...

  • Page 1138

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Configuration...

  • Page 1139

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Command Purpose...

  • Page 1140

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command...

  • Page 1141

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images These sections...

  • Page 1142

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images board_ids:0x401100c4...

  • Page 1143

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Preparing to...

  • Page 1144

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command...

  • Page 1145

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images The algorithm...

  • Page 1146

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images You...

  • Page 1147

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Before you...

  • Page 1148

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command...

  • Page 1149

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images The download...

  • Page 1150

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command...

  • Page 1151

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Preparing to...

  • Page 1152

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images If...

  • Page 1153

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command Purpose...

  • Page 1154

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images The...

  • Page 1155

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command Purpose...

  • Page 1156

    Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Beginning...

  • Page 1157: Unsupported Commands in CiscoIOSRelease12.2(40)EX1

    A P P E N D I X C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 This appendix lists...

  • Page 1158

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 Archive Commands Archive Commands Unsupported Privileged EXEC Commands archive config...

  • Page 1159

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 Embedded Event Manager Unsupported Privileged EXEC Commands debug platform cli-redirection main...

  • Page 1160

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 Fallback Bridging show bridge vlan show interfaces crb show interfaces...

  • Page 1161

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 HSRP bridge-group bridge-group output-lat-service-permit group-list bridge-group bridge-group output-lsap-list access-list-number bridge-group bridge-group...

  • Page 1162

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 Interface Commands Interface Commands Unsupported Privileged EXEC Commands show interfaces...

  • Page 1163

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 IP Unicast Routing Unsupported Global Configuration Commands ip multicast-routing vrf vrf-name...

  • Page 1164

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 IP Unicast Routing show ip bgp regexp regular expression show...

  • Page 1165

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 MAC Address Commands neighbor advertise-map neighbor allowas-in neighbor default-originate neighbor description...

  • Page 1166

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 Miscellaneous show mac-address-table interface show mac-address-table multicast show mac-address-table notification...

  • Page 1167

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 MSDP MSDP Unsupported Privileged EXEC Commands show access-expression show exception show...

  • Page 1168

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 QoS QoS Unsupported Global Configuration Command priority-list Unsupported Interface Configuration...

  • Page 1169

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 Spanning Tree Spanning Tree Unsupported Global Configuration Command spanning-tree pathcost method...

  • Page 1170

    Appendix C Unsupported Commands in Cisco IOS Release 12.2(40)EX1 VTP Cisco Catalyst Blade Switch 3130 for Dell Software Configuration...

  • Page 1171: Index

    I N D EX ACEs Numerics and QoS 36-7 10-Gigabit Ethernet interfaces 10-6 defined 34-2 Ethernet 34-2 IP 34-2...

  • Page 1172

    Index matching criteria 34-8 standard IP, configuring for QoS classification 36-43 undefined 34-21 standard IPv4 IPv4 creating 34-10 applying to...

  • Page 1173

    Index administrative distances AS-path filters, BGP 38-55 defined 38-93 asymmetrical links, and IEEE 802.1Q tunneling 16-4 OSPF 38-33 attributes,...

  • Page 1174

    Index autonegotiation monitoring 38-64 duplex mode 1-4 multipath support 38-53 interface configuration guidelines 10-18 neighbors, types of 38-49 mismatches...

  • Page 1175

    Index boot loader C accessing 3-15 described 3-2 cables, monitoring for unidirectional links 28-1 environment variables 3-15 CA trustpoint...

  • Page 1176

    Index Cisco Discovery Protocol CLI See CDP abbreviating commands 2-4 Cisco Express Forwarding command modes 2-1 See CEF configuration...

  • Page 1177

    Index command-line interface using FTP B-14 See CLI using RCP B-18 command modes 2-1 using TFTP B-12 commands invalid...

  • Page 1178

    Index corrupted software, recovery steps with Xmodem 47-2 D CoS in Layer 2 frames 36-2 daylight saving time 6-13...

  • Page 1179

    Index IPv6 39-13 default routes 38-84 Layer 2 interfaces 10-16 default routing 38-3 Layer 2 protocol tunneling 16-11 deleting...

  • Page 1180

    Index for IP address information 3-5 DHCP snooping binding database for receiving the configuration file 3-5 adding bindings 21-14...

  • Page 1181

    Index distance-vector protocols 38-3 drop threshold for Layer 2 protocol packets 16-11 distribute-list command 38-93 DSCP 1-11, 36-2 DNS...

  • Page 1182

    Index displaying 44-54 error-disabled state for exceeding rate limit 22-4 favoring one over another 44-52 function of 22-2 limiting...

  • Page 1183

    Index enhanced object tracking E commands 42-1 EBGP 38-45 defined 42-1 editing features HSRP 42-7 enabling and disabling 2-7...

  • Page 1184

    Index Layer 3 interface 38-5 Ethernet VLANs load balancing 37-7, 37-17 adding 12-9 logical interfaces, described 37-4 defaults and...

  • Page 1185

    Index fallback bridging fastethernet0 port and protected ports 46-4 See Ethernet management port, internal bridge groups Fast Uplink Transition...

  • Page 1186

    Index flash device, number of B-1 G Flex Links configuration guidelines 20-5 get-bulk-request operation 32-3 configuring 20-6, 20-7 get-next-request...

  • Page 1187

    Index HP OpenView 1-5 ICMP Echo operation HSRP configuring 41-12 authentication string 40-9 IP SLAs 41-11 command-switch redundancy 1-2,...

  • Page 1188

    Index IGMP Version 2 configurable leave timer changing to Version 1 44-33 described 23-6 described 44-3 enabling 23-12 maximum...

  • Page 1189

    Index supported versions 23-3 duplex and speed configuration guidelines 10-18 support for 1-4 flow control 10-20 VLAN configuration 23-8...

  • Page 1190

    Index IP addresses bootstrap router 128-bit 39-2 configuration guidelines 44-12 classes of 38-7 configuring candidate BSRs 44-24 default configuration...

  • Page 1191

    Index reverse path check (RPF) 44-8 IP SLAs routing table benefits 41-2 deleting 44-54 configuration guidelines 41-6 displaying 44-54...

  • Page 1192

    Index default configuration 21-17 dynamic routing 38-3 described 21-16 enabling 38-19 disabling 21-19 EtherChannel Layer 3 interface 38-5 displaying...

  • Page 1193

    Index IPv4 and IPv6 reasons for 39-1 configuring on an interface 39-15 RIP 39-20 differences 39-2 SDM templates 8-2,...

  • Page 1194

    Index described 7-32 Layer 3 features 1-12 KDC 7-32 Layer 3 interfaces operation 7-34 assigning IP addresses to 38-7...

  • Page 1195

    Index supported TLVs 27-2 displaying 6-27 switch stack considerations 27-2 displaying in the IP source binding table 21-19 transmission...

  • Page 1196

    Index management access metric translations, between routing protocols 38-88 in-band metro tags 16-2 browser session 1-6 MHSRP 40-3 CLI...

  • Page 1197

    Index multicast router interfaces 23-17, 24-12 filtering multi-VRF CE 38-80 incoming SA messages 45-14 MVR 23-24 SA messages to...

  • Page 1198

    Index MSTP enabling the mode 18-16 boundary ports EtherChannel guard configuration guidelines 18-16 described 19-10 described 18-6 enabling 19-17...

  • Page 1199

    Index overview 18-2 multicast television application 23-19 Port Fast multicast VLAN 23-18 described 19-2 Multicast VLAN Registration enabling 19-12...

  • Page 1200

    Index network configuration examples N data center 1-18 NAC expanded data center 1-18 AAA down policy 1-10 increasing network...

  • Page 1201

    Index NTP Open Shortest Path First associations See OSPF authenticating 6-4 optimizing system resources 8-1 defined 6-2 options, management...

  • Page 1202

    Index passwords PIM default configuration 7-2 default configuration 44-10 disabling recovery of 7-5 dense mode encrypting 7-3 overview 44-4...

  • Page 1203

    Index policers port-based authentication configuring accounting 9-9 for each matched traffic class 36-48 authentication server for more than one...

  • Page 1204

    Index method lists 9-26 port blocking 1-4, 25-6 multiple-hosts mode, described 9-8 port-channel per-user ACLs See EtherChannel AAA authorization 9-26...

  • Page 1205

    Index port-shutdown response, VMPS 12-29 mapping 15-14 power management TLV 27-6 monitoring 15-15 preemption, default configuration 20-5 ports preemption...

  • Page 1206

    Index pruning, VTP example configuration 36-27 disabling ingress queue defaults 36-21 in VTP domain 13-14 list of generated commands...

  • Page 1207

    Index policy maps on physical ports 36-48 mapping DSCP or CoS values 36-67 port trust states within the domain...

  • Page 1208

    Index hierarchical 36-8 identifying the server 7-20 hierarchical on SVIs 36-52 limiting the services to the user 7-27 nonhierarchical...

  • Page 1209

    Index redundancy restricting access EtherChannel 37-2 NTP services 6-8 HSRP 40-1 overview 7-1 STP passwords and privilege levels 7-2...

  • Page 1210

    Index RMON route targets, VPN 38-68 default configuration 30-3 routing displaying status 30-6 default 38-3 enabling alarms and events...

  • Page 1211

    Index RSTP SDM template active topology 18-10 configuring 8-4 BPDU dual IPv4 and IPv6 8-2 format 18-12 types of...

  • Page 1212

    Index SFPs SNMP monitoring status of 10-26, 47-10 accessing MIB variables with 32-4 numbering of 10-8 agent security and...

  • Page 1213

    Index system contact and location 32-15 SPAN trap manager, configuring 32-13 and stack changes 29-10 traps configuration guidelines 29-11...

  • Page 1214

    Index SSH stack master configuring 7-39 bridge ID (MAC address) 5-8 described 1-6, 7-38 defined 5-1 encryption methods 7-38...

  • Page 1215

    Index default configuration 5-21 software image version 5-11 description of 5-1 stack protocol version 5-12 displaying information of 5-25...

  • Page 1216

    Index static access ports STP assigning to VLAN 12-11 accelerating root port selection 19-4 defined 10-3, 12-3 BackboneFast static...

  • Page 1217

    Index described 19-10 optional features supported 1-7 disabling 19-17 overview 17-2 enabling 19-17 path costs 12-27 extended system ID...

  • Page 1218

    Index SVIs system message logging and IP unicast routing 38-5 default configuration 31-4 and router ACLs 34-4 defining error...

  • Page 1219

    Index authorization 7-16 downloading B-27 login authentication 7-14 preparing the server B-27 default configuration 7-13 uploading B-29 displaying the...

  • Page 1220

    Index tracked objects show forward command 47-18 by Boolean expression 42-4 with CiscoWorks 32-4 by threshold percentage 42-6 with...

  • Page 1221

    Index tunnel ports unicast MAC address filtering 1-6 described 10-4, 16-1 and adding static addresses 6-26 IEEE 802.1Q, configuring...

  • Page 1222

    Index uploading VLAN ACLs configuration files See VLAN maps preparing B-11, B-14, B-17 vlan-assignment response, VMPS 12-29 reasons for...

  • Page 1223

    Index VLAN membership port membership modes 12-3 confirming 12-32 static-access ports 12-11 modes 12-3 STP and IEEE 802.1Q trunks...

  • Page 1224

    Index described 14-1 privileged EXEC mode 13-7 displaying 14-7 requirements 13-9 IP phone data traffic, described 14-2 saving 13-7...

  • Page 1225

    Index support for 1-8 web authentication Token Ring support 13-4 configuring 9-42 to 9-44 transparent mode, configuring 13-12 described...

  • Page 1226

    Index Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide IN-56 OL-13270-01

downloadlike
ArtboardArtboardArtboard