ユーザーズマニュアル目次Catalyst 2960 Switch SoftwareConfiguration Guide1Contents3Preface27Audience27Purpose27Conventions28Related Publications28Obtaining Documentation29Cisco.com29Product Documentation DVD30Ordering Documentation30Documentation Feedback30Cisco Product Security Overview31Reporting Security Problems in Cisco Products31Obtaining Technical Assistance32Cisco Technical Support & Documentation Website32Submitting a Service Request32Definitions of Service Request Severity33Obtaining Additional Publications and Information33Overview35Features35Ease-of-Use and Ease-of-Deployment Features36Performance Features37Management Options37Manageability Features38Availability Features39VLAN Features40Security Features40QoS and CoS Features41Monitoring Features42Default Settings After Initial Switch Configuration42Network Configuration Examples45Design Concepts for Using the Switch45Small to Medium-Sized Network Using Catalyst 2960 Switches48Long-Distance, High-Bandwidth Transport Configuration49Where to Go Next50Using the Command-Line Interface51Understanding Command Modes51Understanding the Help System53Understanding Abbreviated Commands54Understanding no and default Forms of Commands54Understanding CLI Error Messages55Using Command History55Changing the Command History Buffer Size55Recalling Commands56Disabling the Command History Feature56Using Editing Features56Enabling and Disabling Editing Features57Editing Commands through Keystrokes57Editing Command Lines that Wrap58Searching and Filtering Output of show and more Commands59Accessing the CLI59Accessing the CLI through a Console Connection or through Telnet60Assigning the Switch IP Address and Default Gateway61Understanding the Boot Process61Assigning Switch Information62Default Switch Information63Understanding DHCP-Based Autoconfiguration63DHCP Client Request Process64Configuring DHCP-Based Autoconfiguration65DHCP Server Configuration Guidelines65Configuring the TFTP Server65Configuring the DNS66Configuring the Relay Device66Obtaining Configuration Files67Example Configuration68Manually Assigning IP Information69Checking and Saving the Running Configuration70Modifying the Startup Configuration71Default Boot Configuration72Automatically Downloading a Configuration File72Specifying the Filename to Read and Write the System Configuration72Booting Manually73Booting a Specific Software Image73Controlling Environment Variables74Scheduling a Reload of the Software Image75Configuring a Scheduled Reload76Displaying Scheduled Reload Information77Configuring IE2100 CNS Agents79Understanding IE2100Series Configuration Registrar Software79CNS Configuration Service80CNS Event Service81NameSpace Mapper81What You Should Know About ConfigID, DeviceID, and Hostname81ConfigID81DeviceID82Hostname and DeviceID82Using Hostname, DeviceID, and ConfigID82Understanding CNS Embedded Agents83Initial Configuration83Incremental (Partial) Configuration84Synchronized Configuration84Configuring CNS Embedded Agents84Enabling Automated CNS Configuration84Enabling the CNS Event Agent86Enabling the CNS Configuration Agent87Enabling an Initial Configuration87Enabling a Partial Configuration90Displaying CNS Configuration91Clustering Switches93Understanding Switch Clusters93Clustering Overview93Cluster Command Switch Characteristics94Standby Cluster Command Switch Characteristics94Candidate Switch and Cluster Member Switch Characteristics95Using the CLI to Manage Switch Clusters95Catalyst1900 and Catalyst2820 CLI Considerations96Using SNMP to Manage Switch Clusters96Administering the Switch99Managing the System Time and Date99Understanding the System Clock100Understanding Network Time Protocol100Configuring NTP102Default NTP Configuration102Configuring NTP Authentication103Configuring NTP Associations104Configuring NTP Broadcast Service105Configuring NTP Access Restrictions106Configuring the Source IP Address for NTP Packets108Displaying the NTP Configuration109Configuring Time and Date Manually109Setting the System Clock109Displaying the Time and Date Configuration110Configuring the Time Zone110Configuring Summer Time (Daylight Saving Time)111Configuring a System Name and Prompt112Default System Name and Prompt Configuration113Configuring a System Name113Understanding DNS113Default DNS Configuration114Setting Up DNS114Displaying the DNS Configuration115Creating a Banner115Default Banner Configuration115Configuring a Message-of-the-Day Login Banner116Configuring a Login Banner116Managing the MAC Address Table117Building the Address Table118MAC Addresses and VLANs118Default MAC Address Table Configuration118Changing the Address Aging Time119Removing Dynamic Address Entries119Configuring MAC Address Notification Traps119Adding and Removing Static Address Entries121Configuring Unicast MAC Address Filtering122Displaying Address Table Entries123Managing the ARP Table124Configuring SDM Templates125Understanding the SDM Templates125Configuring the Switch SDM Template126Default SDM Template126SDM Template Configuration Guidelines126Setting the SDM Template126Displaying the SDM Templates127Configuring Switch-Based Authentication129Preventing Unauthorized Access to Your Switch129Protecting Access to Privileged EXEC Commands130Default Password and Privilege Level Configuration130Setting or Changing a Static Enable Password131Protecting Enable and Enable Secret Passwords with Encryption131Disabling Password Recovery133Setting a Telnet Password for a Terminal Line134Configuring Username and Password Pairs135Configuring Multiple Privilege Levels136Setting the Privilege Level for a Command136Changing the Default Privilege Level for Lines137Logging into and Exiting a Privilege Level138Controlling Switch Access with TACACS+138Understanding TACACS+138TACACS+ Operation140Configuring TACACS+140Default TACACS+ Configuration141Identifying the TACACS+ Server Host and Setting the Authentication Key141Configuring TACACS+ Login Authentication142Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services144Starting TACACS+ Accounting145Displaying the TACACS+ Configuration145Controlling Switch Access with RADIUS145Understanding RADIUS146RADIUS Operation147Configuring RADIUS148Default RADIUS Configuration148Identifying the RADIUS Server Host148Configuring RADIUS Login Authentication151Defining AAA Server Groups153Configuring RADIUS Authorization for User Privileged Access and Network Services155Starting RADIUS Accounting156Configuring Settings for All RADIUS Servers157Configuring the Switch to Use Vendor-Specific RADIUS Attributes157Configuring the Switch for Vendor-Proprietary RADIUS Server Communication158Displaying the RADIUS Configuration159Configuring the Switch for Local Authentication and Authorization160Configuring the Switch for Secure Shell161Understanding SSH161SSH Servers, Integrated Clients, and Supported Versions161Limitations162Configuring SSH162Configuration Guidelines162Setting Up the Switch to Run SSH163Configuring the SSH Server164Displaying the SSH Configuration and Status164Configuring the Switch for Secure Socket Layer HTTP165Understanding Secure HTTP Servers and Clients165Certificate Authority Trustpoints165CipherSuites167Configuring Secure HTTP Servers and Clients167Default SSL Configuration167SSL Configuration Guidelines168Configuring a CA Trustpoint168Configuring the Secure HTTP Server169Configuring the Secure HTTP Client170Displaying Secure HTTP Server and Client Status171Configuring IEEE 802.1x Port-Based Authentication173Understanding IEEE 802.1x Port-Based Authentication173Device Roles174Authentication Initiation and Message Exchange175Ports in Authorized and Unauthorized States176IEEE 802.1x Accounting177IEEE 802.1x Accounting Attribute-Value Pairs177IEEE 802.1x Host Mode178Using IEEE 802.1x with Port Security179Using IEEE 802.1x with Voice VLAN Ports180Using IEEE 802.1x with VLAN Assignment180Using IEEE 802.1x with Guest VLAN182Configuring IEEE 802.1x Authentication182Default IEEE 802.1x Configuration183IEEE 802.1x Configuration Guidelines184Configuring IEEE 802.1x Authentication184Configuring the Switch-to-RADIUS-Server Communication186Configuring Periodic Re-Authentication187Manually Re-Authenticating a Client Connected to a Port187Changing the Quiet Period188Changing the Switch-to-Client Retransmission Time188Setting the Switch-to-Client Frame-Retransmission Number189Setting the Re-Authentication Number189Configuring the Host Mode190Configuring a Guest VLAN191Resetting the IEEE 802.1x Configuration to the Default Values192Configuring IEEE 802.1x Accounting193Displaying IEEE 802.1x Statistics and Status194Configuring Interface Characteristics195Understanding Interface Types195Port-Based VLANs196Switch Ports196Access Ports196Trunk Ports197EtherChannel Port Groups197Dual-Purpose Uplink Ports198Connecting Interfaces198Using Interface Configuration Mode198Procedures for Configuring Interfaces199Configuring a Range of Interfaces200Configuring and Using Interface Range Macros201Configuring Ethernet Interfaces203Default Ethernet Interface Configuration203Configuring Interface Speed and Duplex Mode204Speed and Duplex Configuration Guidelines205Setting the Type of a Dual-Purpose Uplink Port205Setting the Interface Speed and Duplex Parameters207Configuring IEEE 802.3x Flow Control208Configuring Auto-MDIX on an Interface209Adding a Description for an Interface210Configuring the System MTU210Monitoring and Maintaining the Interfaces212Monitoring Interface Status212Clearing and Resetting Interfaces and Counters213Shutting Down and Restarting the Interface213Configuring Smartports Macros215Understanding Smartports Macros215Configuring Smartports Macros216Default Smartports Macro Configuration216Smartports Macro Configuration Guidelines217Creating Smartports Macros218Applying Smartports Macros219Applying Cisco-Default Smartports Macros220Displaying Smartports Macros222Configuring VLANs223Understanding VLANs223Supported VLANs224VLAN Port Membership Modes225Configuring Normal-Range VLANs226Token Ring VLANs227Normal-Range VLAN Configuration Guidelines227VLAN Configuration Mode Options228VLAN Configuration in config-vlan Mode228VLAN Configuration in VLAN Database Configuration Mode228Saving VLAN Configuration228Default Ethernet VLAN Configuration229Creating or Modifying an Ethernet VLAN230Deleting a VLAN231Assigning Static-Access Ports to a VLAN232Configuring Extended-Range VLANs233Default VLAN Configuration233Extended-Range VLAN Configuration Guidelines234Creating an Extended-Range VLAN234Displaying VLANs235Configuring VLAN Trunks236Trunking Overview236IEEE 802.1Q Configuration Considerations237Default Layer 2 Ethernet Interface VLAN Configuration238Configuring an Ethernet Interface as a Trunk Port238Interaction with Other Features238Configuring a Trunk Port239Defining the Allowed VLANs on a Trunk240Changing the Pruning-Eligible List241Configuring the Native VLAN for Untagged Traffic241Configuring Trunk Ports for Load Sharing242Load Sharing Using STP Port Priorities242Load Sharing Using STP Path Cost244Configuring VMPS245Understanding VMPS246Dynamic-Access Port VLAN Membership246Default VMPS Client Configuration247VMPS Configuration Guidelines247Configuring the VMPS Client248Entering the IP Address of the VMPS248Configuring Dynamic-Access Ports on VMPS Clients248Reconfirming VLAN Memberships249Changing the Reconfirmation Interval249Changing the Retry Count250Monitoring the VMPS250Troubleshooting Dynamic-Access Port VLAN Membership251VMPS Configuration Example251Configuring VTP253Understanding VTP253The VTP Domain254VTP Modes255VTP Advertisements255VTP Version 2256VTP Pruning256Configuring VTP258Default VTP Configuration258VTP Configuration Options259VTP Configuration in Global Configuration Mode259VTP Configuration in VLAN Database Configuration Mode259VTP Configuration Guidelines260Domain Names260Passwords260VTP Version260Configuration Requirements261Configuring a VTP Server261Configuring a VTP Client263Disabling VTP (VTP Transparent Mode)264Enabling VTP Version 2265Enabling VTP Pruning266Adding a VTP Client Switch to a VTP Domain266Monitoring VTP268Configuring Voice VLAN269Understanding Voice VLAN269Cisco IP Phone Voice Traffic270Cisco IP Phone Data Traffic270Configuring Voice VLAN271Default Voice VLAN Configuration271Voice VLAN Configuration Guidelines271Configuring a Port Connected to a Cisco7960 IP Phone272Configuring IP Phone Voice Traffic273Configuring the Priority of Incoming Data Frames274Displaying Voice VLAN274Configuring STP275Understanding Spanning-Tree Features275STP Overview276Spanning-Tree Topology and BPDUs277Bridge ID, Switch Priority, and Extended System ID278Spanning-Tree Interface States278Blocking State280Listening State280Learning State280Forwarding State280Disabled State281How a Switch or Port Becomes the Root Switch or Root Port281Spanning Tree and Redundant Connectivity282Spanning-Tree Address Management282Accelerated Aging to Retain Connectivity282Spanning-Tree Modes and Protocols283Supported Spanning-Tree Instances283Spanning-Tree Interoperability and Backward Compatibility284STP and IEEE 802.1Q Trunks284Configuring Spanning-Tree Features284Default Spanning-Tree Configuration285Spanning-Tree Configuration Guidelines285Changing the Spanning-Tree Mode.286Disabling Spanning Tree287Configuring the Root Switch288Configuring a Secondary Root Switch289Configuring Port Priority290Configuring Path Cost291Configuring the Switch Priority of a VLAN293Configuring Spanning-Tree Timers293Configuring the Hello Time294Configuring the Forwarding-Delay Time for a VLAN295Configuring the Maximum-Aging Time for a VLAN295Displaying the Spanning-Tree Status296Configuring MSTP297Understanding MSTP298Multiple Spanning-Tree Regions298IST, CIST, and CST299Operations Within an MST Region299Operations Between MST Regions300Hop Count301Boundary Ports301Interoperability with IEEE 802.1D STP301Understanding RSTP302Port Roles and the Active Topology302Rapid Convergence303Synchronization of Port Roles304Bridge Protocol Data Unit Format and Processing305Processing Superior BPDU Information306Processing Inferior BPDU Information306Topology Changes306Configuring MSTP Features307Default MSTP Configuration307MSTP Configuration Guidelines308Specifying the MST Region Configuration and Enabling MSTP309Configuring the Root Switch310Configuring a Secondary Root Switch311Configuring Port Priority312Configuring Path Cost313Configuring the Switch Priority314Configuring the Hello Time315Configuring the Forwarding-Delay Time316Configuring the Maximum-Aging Time316Configuring the Maximum-Hop Count317Specifying the Link Type to Ensure Rapid Transitions317Restarting the Protocol Migration Process318Displaying the MST Configuration and Status318Configuring Optional Spanning-Tree Features319Understanding Optional Spanning-Tree Features319Understanding Port Fast320Understanding BPDU Guard321Understanding BPDU Filtering321Understanding UplinkFast322Understanding BackboneFast323Understanding EtherChannel Guard325Understanding Root Guard326Understanding Loop Guard327Configuring Optional Spanning-Tree Features327Default Optional Spanning-Tree Configuration327Optional Spanning-Tree Configuration Guidelines328Enabling Port Fast328Enabling BPDU Guard329Enabling BPDU Filtering330Enabling UplinkFast for Use with Redundant Links331Enabling BackboneFast332Enabling EtherChannel Guard332Enabling Root Guard333Enabling Loop Guard333Displaying the Spanning-Tree Status334Configuring Flex Links335Understanding Flex Links335Configuring Flex Links336Default Flex Link Configuration336Flex Link Configuration Guidelines336Configuring Flex Links337Monitoring Flex Links337Configuring DHCP Features339Understanding DHCP Features339DHCP Server340DHCP Relay Agent340DHCP Snooping340Option-82 Data Insertion341DHCP Snooping Binding Database343Configuring DHCP Features344Default DHCP Configuration345DHCP Snooping Configuration Guidelines345Configuring the DHCP Relay Agent346Enabling DHCP Snooping and Option 82347Enabling the DHCP Snooping Binding Database Agent348Displaying DHCP Snooping Information349Configuring IGMP Snooping and MVR351Understanding IGMP Snooping351IGMP Versions352Joining a Multicast Group353Leaving a Multicast Group354Immediate Leave355IGMP Configurable-Leave Timer355IGMP Report Suppression355Configuring IGMP Snooping356Default IGMP Snooping Configuration356Enabling or Disabling IGMP Snooping356Setting the Snooping Method357Configuring a Multicast Router Port358Configuring a Host Statically to Join a Group359Enabling IGMP Immediate Leave359Configuring the IGMP Leave Timer360Configuring TCN-Related Commands361Controlling the Multicast Flooding Time After a TCN Event361Recovering from Flood Mode362Disabling Multicast Flooding During a TCN Event362Configuring the IGMP Snooping Querier363Disabling IGMP Report Suppression364Displaying IGMP Snooping Information364Understanding Multicast VLAN Registration366Using MVR in a Multicast Television Application366Configuring MVR368Default MVR Configuration368MVR Configuration Guidelines and Limitations368Configuring MVR Global Parameters369Configuring MVR Interfaces370Displaying MVR Information371Configuring IGMP Filtering and Throttling372Default IGMP Filtering and Throttling Configuration373Configuring IGMP Profiles373Applying IGMP Profiles374Setting the Maximum Number of IGMP Groups375Configuring the IGMP Throttling Action375Displaying IGMP Filtering and Throttling Configuration377Configuring Port-Based Traffic Control379Configuring Storm Control379Understanding Storm Control379Default Storm Control Configuration381Configuring Storm Control and Threshold Levels381Configuring Protected Ports383Default Protected Port Configuration383Protected Port Configuration Guidelines384Configuring a Protected Port384Configuring Port Blocking384Default Port Blocking Configuration384Blocking Flooded Traffic on an Interface385Configuring Port Security385Understanding Port Security386Secure MAC Addresses386Security Violations387Default Port Security Configuration388Port Security Configuration Guidelines388Enabling and Configuring Port Security389Enabling and Configuring Port Security Aging393Displaying Port-Based Traffic Control Settings394Configuring CDP395Understanding CDP395Configuring CDP396Default CDP Configuration396Configuring the CDP Characteristics396Disabling and Enabling CDP397Disabling and Enabling CDP on an Interface398Monitoring and Maintaining CDP399Configuring SPAN and RSPAN401Understanding SPAN and RSPAN401Local SPAN402Remote SPAN402SPAN and RSPAN Concepts and Terminology403SPAN Sessions403Monitored Traffic404Source Ports405Source VLANs406VLAN Filtering406Destination Port406RSPAN VLAN408SPAN and RSPAN Interaction with Other Features408Configuring SPAN and RSPAN409Default SPAN and RSPAN Configuration409Configuring Local SPAN410SPAN Configuration Guidelines410Creating a Local SPAN Session410Creating a Local SPAN Session and Configuring Incoming Traffic413Specifying VLANs to Filter415Configuring RSPAN416RSPAN Configuration Guidelines416Configuring a VLAN as an RSPAN VLAN417Creating an RSPAN Source Session418Creating an RSPAN Destination Session419Creating an RSPAN Destination Session and Configuring Incoming Traffic420Specifying VLANs to Filter422Displaying SPAN and RSPAN Status423Configuring UDLD425Understanding UDLD425Modes of Operation425Methods to Detect Unidirectional Links426Configuring UDLD428Default UDLD Configuration428Configuration Guidelines428Enabling UDLD Globally429Enabling UDLD on an Interface429Resetting an Interface Disabled by UDLD430Displaying UDLD Status430Configuring RMON431Understanding RMON431Configuring RMON432Default RMON Configuration433Configuring RMON Alarms and Events433Collecting Group History Statistics on an Interface435Collecting Group Ethernet Statistics on an Interface436Displaying RMON Status436Configuring System Message Logging437Understanding System Message Logging437Configuring System Message Logging438System Log Message Format438Default System Message Logging Configuration439Disabling Message Logging439Setting the Message Display Destination Device440Synchronizing Log Messages441Enabling and Disabling Time Stamps on Log Messages443Enabling and Disabling Sequence Numbers in Log Messages443Defining the Message Severity Level444Limiting Syslog Messages Sent to the History Table and to SNMP445Configuring UNIX Syslog Servers446Logging Messages to a UNIX Syslog Daemon447Configuring the UNIX System Logging Facility447Displaying the Logging Configuration448Configuring SNMP449Understanding SNMP449SNMP Versions450SNMP Manager Functions451SNMP Agent Functions452SNMP Community Strings452Using SNMP to Access MIB Variables452SNMP Notifications453SNMP ifIndex MIB Object Values453Configuring SNMP454Default SNMP Configuration454SNMP Configuration Guidelines455Disabling the SNMP Agent456Configuring Community Strings456Configuring SNMP Groups and Users457Configuring SNMP Notifications459Setting the Agent Contact and Location Information462Limiting TFTP Servers Used Through SNMP463SNMP Examples463Displaying SNMP Status464Configuring Network Security with ACLs465Understanding ACLs465Port ACLs466Handling Fragmented and Unfragmented Traffic467Configuring IPv4 ACLs468Creating Standard and Extended IPv4 ACLs469Access List Numbers470Creating a Numbered Standard ACL471Creating a Numbered Extended ACL472Resequencing ACEs in an ACL476Creating Named Standard and Extended ACLs476Using Time Ranges with ACLs478Including Comments in ACLs479Applying an IPv4 ACL to a Terminal Line480Applying an IPv4 ACL to an Interface481Hardware and Software Treatment of IP ACLs481IPv4 ACL Configuration Examples482Numbered ACLs482Extended ACLs482Named ACLs483Time Range Applied to an IP ACL483Commented IP ACL Entries483Creating Named MAC Extended ACLs484Applying a MAC ACL to a Layer 2 Interface485Displaying IPv4 ACL Configuration486Configuring QoS487Understanding QoS487Basic QoS Model489Classification491Classification Based on QoS ACLs493Classification Based on Class Maps and Policy Maps493Policing and Marking494Policing on Physical Ports495Mapping Tables496Queueing and Scheduling Overview497Weighted Tail Drop498SRR Shaping and Sharing498Queueing and Scheduling on Ingress Queues499Queueing and Scheduling on Egress Queues501Packet Modification504Configuring Auto-QoS505Generated Auto-QoS Configuration505Effects of Auto-QoS on the Configuration510Auto-QoS Configuration Guidelines510Enabling Auto-QoS for VoIP511Auto-QoS Configuration Example512Displaying Auto-QoS Information514Configuring Standard QoS514Default Standard QoS Configuration515Default Ingress Queue Configuration515Default Egress Queue Configuration516Default Mapping Table Configuration517Standard QoS Configuration Guidelines517QoS ACL Guidelines517Policing Guidelines517General QoS Guidelines518Enabling QoS Globally518Configuring Classification Using Port Trust States518Configuring the Trust State on Ports within the QoS Domain519Configuring the CoS Value for an Interface520Configuring a Trusted Boundary to Ensure Port Security521Enabling DSCP Transparency Mode522Configuring the DSCP Trust State on a Port Bordering Another QoS Domain523Configuring a QoS Policy525Classifying Traffic by Using ACLs526Classifying Traffic by Using Class Maps529Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps531Classifying, Policing, and Marking Traffic by Using Aggregate Policers534Configuring DSCP Maps537Configuring the CoS-to-DSCP Map537Configuring the IP-Precedence-to-DSCP Map538Configuring the Policed-DSCP Map539Configuring the DSCP-to-CoS Map540Configuring the DSCP-to-DSCP-Mutation Map541Configuring Ingress Queue Characteristics543Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds543Allocating Buffer Space Between the Ingress Queues545Allocating Bandwidth Between the Ingress Queues546Configuring the Ingress Priority Queue547Configuring Egress Queue Characteristics548Configuration Guidelines548Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set548Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID550Configuring SRR Shaped Weights on Egress Queues552Configuring SRR Shared Weights on Egress Queues553Configuring the Egress Expedite Queue554Limiting the Bandwidth on an Egress Interface554Displaying Standard QoS Information555Configuring EtherChannels557Understanding EtherChannels557EtherChannel Overview558Port-Channel Interfaces559Port Aggregation Protocol560PAgP Modes560PAgP Interaction with Other Features561Link Aggregation Control Protocol561LACP Modes561LACP Interaction with Other Features562EtherChannel On Mode562Load Balancing and Forwarding Methods562Configuring EtherChannels564Default EtherChannel Configuration565EtherChannel Configuration Guidelines565Configuring Layer2 EtherChannels566Configuring EtherChannel Load Balancing568Configuring the PAgP Learn Method and Priority569Configuring LACP Hot-Standby Ports570Configuring the LACP System Priority571Configuring the LACP Port Priority571Displaying EtherChannel, PAgP, and LACP Status572Troubleshooting575Recovering from a Software Failure576Recovering from a Lost or Forgotten Password577Procedure with Password Recovery Enabled578Procedure with Password Recovery Disabled580Recovering from a Command Switch Failure581Replacing a Failed Command Switch with a Cluster Member582Replacing a Failed Command Switch with Another Switch583Recovering from Lost Cluster Member Connectivity585Preventing Autonegotiation Mismatches585SFP Module Security and Identification585Monitoring SFP Module Status586Using Ping586Understanding Ping586Executing Ping587Using Layer 2 Traceroute587Understanding Layer 2 Traceroute588Usage Guidelines588Displaying the Physical Path589Using IP Traceroute589Understanding IP Traceroute589Executing IP Traceroute590Using TDR591Understanding TDR591Running TDR and Displaying the Results591Using Debug Commands592Enabling Debugging on a Specific Feature592Enabling All-System Diagnostics593Redirecting Debug and Error Message Output593Using the show platform forward Command593Using the crashinfo File595Supported MIBs597MIB List597Using FTP to Access the MIB Files599Working with the Cisco IOS File System, Configuration Files, and Software Images601Working with the Flash File System601Displaying Available File Systems602Setting the Default File System603Displaying Information about Files on a File System603Changing Directories and Displaying the Working Directory603Creating and Removing Directories604Copying Files604Deleting Files605Creating, Displaying, and Extracting tar Files605Creating a tar File606Displaying the Contents of a tar File606Extracting a tar File607Displaying the Contents of a File608Working with Configuration Files608Guidelines for Creating and Using Configuration Files609Configuration File Types and Location609Creating a Configuration File By Using a Text Editor610Copying Configuration Files By Using TFTP610Preparing to Download or Upload a Configuration File By Using TFTP610Downloading the Configuration File By Using TFTP611Uploading the Configuration File By Using TFTP611Copying Configuration Files By Using FTP612Preparing to Download or Upload a Configuration File By Using FTP613Downloading a Configuration File By Using FTP613Uploading a Configuration File By Using FTP614Copying Configuration Files By Using RCP615Preparing to Download or Upload a Configuration File By Using RCP616Downloading a Configuration File By Using RCP617Uploading a Configuration File By Using RCP618Clearing Configuration Information618Clearing the Startup Configuration File619Deleting a Stored Configuration File619Working with Software Images619Image Location on the Switch620tar File Format of Images on a Server or Cisco.com620Copying Image Files By Using TFTP621Preparing to Download or Upload an Image File By Using TFTP621Downloading an Image File By Using TFTP622Uploading an Image File By Using TFTP624Copying Image Files By Using FTP624Preparing to Download or Upload an Image File By Using FTP625Downloading an Image File By Using FTP626Uploading an Image File By Using FTP628Copying Image Files By Using RCP629Preparing to Download or Upload an Image File By Using RCP629Downloading an Image File By Using RCP631Uploading an Image File By Using RCP632Recommendations for Upgrading a Catalyst2950Switch to a Catalyst 2960 Switch635Configuration Compatibility Issues635Feature Behavior Incompatibilities639Unsupported Commands in CiscoIOSRelease12.2(25)FX641Access Control Lists641Unsupported Privileged EXEC Commands641Unsupported Global Configuration Commands641Debug Commands641Unsupported Privileged EXEC Commands641IGMP Snooping Commands642Unsupported Global Configuration Commands642Interface Commands642Unsupported Privileged EXEC Commands642Unsupported Global Configuration Commands642Unsupported Interface Configuration Commands642MAC Address Commands642Unsupported Privileged EXEC Commands642Unsupported Global Configuration Commands643Miscellaneous643Unsupported Privileged EXEC Commands643Unsupported Global Configuration Commands643Network Address Translation (NAT) Commands643Unsupported Privileged EXEC Commands643QoS643Unsupported Global Configuration Commands643Unsupported Interface Configuration Commands644RADIUS644Unsupported Global Configuration Commands644SNMP644Unsupported Global Configuration Commands644Spanning Tree644Unsupported Global Configuration Command644Unsupported Interface Configuration Command644VLAN644Unsupported Global Configuration Commands644Unsupported vlan-config Command645Unsupported User EXEC Commands645VTP645Unsupported Privileged EXEC Commands645Index647サイズ: 7.51MBページ数: 680Language: Englishマニュアルを開く