Sign In
Upload
Manuals
Brands
Cisco Manuals
Switch
Catalyst3560-E
Cisco Catalyst3560-E Switch Manuals
Manuals and User Guides for Cisco Catalyst3560-E Switch. We have
1
Cisco Catalyst3560-E Switch manual available for free PDF download: Software Configuration Manual
Cisco Catalyst3560-E Software Configuration Manual (1414 pages)
Brand:
Cisco
| Category:
Switch
| Size: 41.58 MB
Table of Contents
Table of Contents
7
Related Publications
50
Obtaining Documentation and Submitting a Service Request
51
Deployment Features
54
Performance Features
56
Management Options
57
Manageability Features
58
Availability and Redundancy Features
60
Security Features
61
Vlan Features
61
Qos and Cos Features
64
Layer 3 Features
66
Monitoring Features
67
Power over Ethernet Features
67
Default Settings after Initial Switch Configuration
68
Design Concepts for Using the Switch
71
Network Configuration Examples
71
Where to Go Next
85
Understanding Command Modes
87
Understanding Abbreviated Commands
89
Understanding the Help System
89
Understanding Cli Error Messages
90
Understanding no and Default Forms of Commands
90
Using Configuration Logging
90
Changing the Command History Buffer Size
91
Using Command History
91
Disabling the Command History Feature
92
Enabling and Disabling Editing Features
92
Recalling Commands
92
Using Editing Features
92
Editing Commands through Keystrokes
93
Editing Command Lines that Wrap
94
Accessing the Cli
95
Searching and Filtering Output of Show and more Commands
95
Accessing the Cli through a Console Connection or through Telnet
96
Understanding the Boot Process
97
Assigning Switch Information
98
Default Switch Information
99
Dhcp Client Request Process
100
Configuring the Dns
104
Configuring the Relay Device
104
Configuring the Dhcp Auto Configuration and Image Update Features
107
Configuring the Client
110
Manually Assigning Ip Information
111
Checking and Saving the Running Configuration
112
Automatically Downloading a Configuration File
114
Default Boot Configuration
114
Modifying the Startup Configuration
114
Booting Manually
115
Specifying the Filename to Read and Write the System Configuration
115
Booting a Specific Software Image
116
Controlling Environment Variables
117
Configuring a Scheduled Reload
120
Scheduling a Reload of the Software Image
120
Displaying Scheduled Reload Information
121
Understanding Cisco Configuration Engine Software
123
Configuration Service
124
Event Service
125
Namespace Mapper
125
What You Should Know about the Cns Ids and Device Hostnames
125
Initial Configuration
127
Understanding Cisco Ios Agents
127
Configuring Cisco Ios Agents
128
Enabling Automated Cns Configuration
128
Synchronized Configuration
128
Enabling the Cns Event Agent
130
Enabling the Cisco Ios Cns Agent
131
Enabling a Partial Configuration
135
Displaying Cns Configuration
136
Managing Switch Stacks
137
Understanding Switch Stacks
137
Switch Stack Membership
139
Stack Member Numbers
143
Switch Stack Bridge ID and Router Mac Address
143
Stack Member Priority Values
144
Switch Stack Offline Configuration
144
Hardware Compatibility and Sdm Mismatch Mode in Switch Stacks
146
Major Version Number Incompatibility Among Switches
147
Minor Version Number Incompatibility Among Switches
147
Stack Protocol Version Compatibility
147
Switch Stack Software Compatibility Recommendations
147
Incompatible Software and Stack Member Image Upgrades
151
Switch Stack Configuration Files
151
Switch Stack Management Connectivity
152
Switch Stack Configuration Scenarios
154
Configuring the Switch Stack
156
Default Switch Stack Configuration
156
Enabling Persistent Mac Address
156
Assigning a Stack Member Number
158
Assigning Stack Member Information
158
Accessing the Cli of a Specific Stack Member
161
Displaying Switch Stack Information
161
Troubleshooting Stacks
161
Manually Disabling a Stack Port
162
Identifying Loopback Problems
164
Software Loopback
164
Hardware Loopback Example: LINK OK Event
166
Hardware Loop Example: LINK NOT OK Event
167
Finding a Disconnected Stack Cable
168
Fixing a Bad Connection between Stack Ports
169
CHAPTER 6 Clustering Switches
171
Understanding Switch Clusters
172
Cluster Command Switch Characteristics
173
Standby Cluster Command Switch Characteristics
173
Candidate Switch and Cluster Member Switch Characteristics
174
Planning a Switch Cluster
174
Automatic Discovery of Cluster Candidates and Members
174
HSRP and Standby Cluster Command Switches
174
Discovery through Routed Ports
178
Discovery of Newly Installed Switches
179
Other Considerations for Cluster Standby Groups
181
Virtual IP Addresses
181
Automatic Recovery of Cluster Configuration
182
IP Addresses
183
Hostnames
183
SNMP Community Strings
184
Switch Clusters and Switch Stacks
184
TACACS+ and RADIUS
186
LRE Profiles
186
Using the CLI to Manage Switch Clusters
186
Catalyst 1900 and Catalyst 2820 CLI Considerations
187
Using SNMP to Manage Switch Clusters
187
Administering the Switch
189
Chapter 7 Administering the Switch
190
Managing the System Time and Date
190
Understanding the System Clock
190
Understanding Network Time Protocol
190
Configuring NTP
192
Default NTP Configuration
192
Configuring Ntp Associations
193
Configuring Ntp Access Restrictions
196
Configuring Time and Date Manually
199
Displaying the Ntp Configuration
199
Configuring a System Name and Prompt
202
Configuring a System Name
203
Default System Name and Prompt Configuration
203
Understanding Dns
203
Creating a Banner
205
Default Banner Configuration
205
Configuring a Login Banner
207
Managing the Mac Address Table
207
Building the Address Table
208
Mac Addresses and Vlans
208
Changing the Address Aging Time
209
Default Mac Address Table Configuration
209
Mac Addresses and Switch Stacks
209
Configuring Mac Address Change Notification Traps
210
Removing Dynamic Address Entries
210
Configuring Mac Address Move Notification Traps
212
Configuring Mac Threshold Notification Traps
213
Adding and Removing Static Address Entries
215
Configuring Unicast Mac Address Filtering
216
Disabling Mac Address Learning on a Vlan
217
Displaying Address Table Entries
218
Managing the Arp Table
219
Understanding the Sdm Templates
221
Dual Ipv4 and Ipv6 Sdm Templates
222
Sdm Templates and Switch Stacks
223
Configuring the Switch Sdm Template
224
Default Sdm Template
224
Sdm Template Configuration Guidelines
224
Setting the Sdm Template
225
Displaying the Sdm Templates
226
Preventing Unauthorized Access to Your Switch
229
Default Password and Privilege Level Configuration
230
Protecting Access to Privileged Exec Commands
230
Protecting Enable and Enable Secret Passwords with Encryption
231
Setting or Changing a Static Enable Password
231
Disabling Password Recovery
233
Configuring Username and Password Pairs
234
Setting a Telnet Password for a Terminal Line
234
Configuring Multiple Privilege Levels
235
Controlling Switch Access with Tacacs
238
Understanding Tacacs
238
Configuring Tacacs
240
Controlling Switch Access with Radius
245
Understanding Radius
246
Radius Change of Authorization
247
Radius Operation
247
Coa Request Commands
248
Stacking Guidelines for Session Termination
253
Configuring Radius
254
Default RADIUS Configuration
255
Identifying the RADIUS Server Host
255
Configuring RADIUS Login Authentication
257
Defining AAA Server Groups
259
Configuring RADIUS Authorization for User Privileged Access and Network Services
261
Establishing a Session with a Router if the AAA Server Is Unreachable
262
Starting RADIUS Accounting
262
Configuring Settings for All RADIUS Servers
263
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
263
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
265
Configuring Coa on the Switch
266
Configuring RADIUS Server Load Balancing
267
Controlling Switch Access with Kerberos
267
Displaying the RADIUS Configuration
267
Monitoring and Troubleshooting Coa Functionality
267
Understanding Kerberos
268
Authenticating to a Boundary Switch
270
Authenticating to Network Services
270
Kerberos Operation
270
Obtaining a TGT from a KDC
270
Configuring Kerberos
271
Configuring the Switch for Local Authentication and Authorization
271
Configuring the Switch for Secure Shell
273
Understanding SSH
273
Configuration Guidelines
274
Configuring SSH
274
Setting up the Switch to Run SSH
274
Configuring the SSH Server
275
Displaying the SSH Configuration and Status
276
Certificate Authority Trustpoints
277
Configuring the Switch for Secure Socket Layer HTTP
277
Understanding Secure HTTP Servers and Clients
277
Ciphersuites
279
Configuring Secure HTTP Servers and Clients
279
Configuring the Secure Http Server
281
Configuring the Secure Http Client
282
Configuring the Switch for Secure Copy Protocol
283
Displaying Secure Http Server and Client Status
283
Information about Secure Copy
284
Authentication Initiation and Message Exchange
290
Authentication Manager
292
Ports in Authorized and Unauthorized States
295
X Authentication and Switch Stacks
295
X Host Mode
296
Mac Move
297
X Multiple Authentication Mode
297
X Authentication with Vlan Assignment
300
X Readiness Check
300
X Authentication with Downloadable Acls and Redirect Urls
303
X Authentication with Guest Vlan
305
X Authentication with Restricted Vlan
306
X Authentication with Inaccessible Authentication Bypass
307
X User Distribution
309
Flexible Authentication Ordering
313
Open1X Authentication
313
Multidomain Authentication
314
Common Session ID
317
X Authentication Configuration Guidelines
319
Configuring the Host Mode
328
Changing the Quiet Period
330
Enabling Mac Move
333
Configuring a Guest Vlan
335
Configuring a Restricted Vlan
336
Configuring the Inaccessible Authentication Bypass Feature
338
Configuring Mac Authentication Bypass
341
Configuring an Authenticator and a Supplicant Switch with Neat
344
Configuring Downloadable Acls
346
Configuring a Downloadable Policy
347
Configuring Flexible Authentication Ordering
349
Configuring Open1X
349
Host Detection
354
Session Creation
355
Local Web Authentication Banner
356
Web Authentication Customizable Web Pages
358
Configuring the Authentication Rule and Interfaces
362
Configuring Aaa Authentication
363
Configuring the Http Server
365
Customizing the Authentication Proxy Web Pages
365
Configuring an Aaa Fail Policy
367
Interface Types
371
Switch Ports
372
Routed Ports
374
Switch Virtual Interfaces
375
Etherchannel Port Groups
376
Gigabit Ethernet Interfaces
376
Power over Ethernet Ports
376
Power Management Modes
379
Connecting Interfaces
381
Using Interface Configuration Mode
382
Procedures for Configuring Interfaces
383
Configuring a Range of Interfaces
384
Configuring and Using Interface Range Macros
386
Understanding the Ethernet Management Port
388
Using the Ethernet Management Port
388
Configuring the Ethernet Management Port
390
Supported Features on the Ethernet Management Port
390
Configuring Ethernet Interfaces
391
Tftp and the Ethernet Management Port
391
Default Ethernet Interface Configuration
392
Configuring Interface Speed and Duplex Mode
393
Configuring a Power Management Mode on a Poe Port
397
Budgeting Power for Devices Connected to a Poe Port
398
Configuring Power Policing
400
Adding a Description for an Interface
401
Configuring Layer 3 Interfaces
402
Configuring Svi Autostate Exclude
403
Configuring the System Mtu
404
Configuring the Power Supplies
408
Monitoring and Maintaining the Interfaces
409
Monitoring Interface Status
410
Clearing and Resetting Interfaces and Counters
411
Shutting down and Restarting the Interface
412
Configuring Vlans
413
Understanding Vlans
413
Supported Vlans
414
Vlan Port Membership Modes
415
Token Ring Vlans
417
Saving Vlan Configuration
418
Default Ethernet Vlan Configuration
419
Creating or Modifying an Ethernet Vlan
420
Deleting a Vlan
421
Default Vlan Configuration
422
Configuring Vlan Trunks
426
Displaying Vlans
426
Trunking Overview
426
Configuring an Ethernet Interface as a Trunk Port
429
Default Layer 2 Ethernet Interface Vlan Configuration
429
Interaction with Other Features
430
Configuring Trunk Ports for Load Sharing
434
Configuring Vmps
437
Understanding Vmps
438
Default Vmps Client Configuration
439
Vmps Configuration Guidelines
439
Configuring the Vmps Client
440
Monitoring the Vmps
442
Vmps Configuration Example
443
The Vtp Domain
446
Vtp Modes
447
Vtp Advertisements
448
Vtp Version 2
448
Vtp Version 3
449
Vtp Pruning
450
Vtp and Switch Stacks
451
Default Vtp Configuration
452
Vtp Configuration Guidelines
453
Configuring Vtp Mode
455
Enabling the Vtp Version
458
Enabling Vtp Pruning
459
Adding a Vtp Client Switch to a Vtp Domain
460
Monitoring Vtp
461
Cisco Ip Phone Data Traffic
464
Cisco Ip Phone Voice Traffic
464
Default Voice Vlan Configuration
465
Voice Vlan Configuration Guidelines
465
Configuring a Port Connected to a Cisco 7960 Ip Phone
466
Configuring the Priority of Incoming Data Frames
468
Displaying Voice Vlan
469
Ip Addressing Scheme with Private Vlans
473
Private Vlans Across Multiple Switches
474
Tasks for Configuring Private Vlans
476
Configuring and Associating Vlans in a Private Vlan
479
Mapping Secondary Vlans to a Primary Vlan Layer 3 Vlan Interface
483
Monitoring Private Vlans
484
System Mtu
489
Understanding Layer 2 Protocol Tunneling
492
Default Layer 2 Protocol Tunneling Configuration
495
Layer 2 Protocol Tunneling Configuration Guidelines
496
Configuring Layer 2 Tunneling for Etherchannels
498
Configuring the Customer Switch
500
Monitoring and Maintaining Tunneling Status
502
Configuring Stp
503
Stp Overview
504
Disabled State
509
Forwarding State
509
Learning State
509
Listening State
509
How a Switch or Port Becomes the Root Switch or Root Port
510
Spanning Tree and Redundant Connectivity
510
Accelerated Aging to Retain Connectivity
511
Spanning Tree and Switch Stacks
514
Disabling Spanning Tree
518
Configuring the Switch Priority of a Vlan
523
Configuring Mstp
527
Understanding Mstp
528
Hop Count
531
Boundary Ports
532
Mstp and Switch Stacks
534
Port Roles and the Active Topology
535
Understanding Rstp
535
Rapid Convergence
536
Synchronization of Port Roles
537
Bridge Protocol Data Unit Format and Processing
538
Topology Changes
539
Configuring Mstp Features
540
Default Mstp Configuration
540
Mstp Configuration Guidelines
541
Specifying the Mst Region Configuration and Enabling Mstp
542
Configuring the Switch Priority
548
Configuring the Hello Time
549
Specifying the Link Type to Ensure Rapid Transitions
551
Designating the Neighbor Type
552
Restarting the Protocol Migration Process
552
Displaying the Mst Configuration and Status
553
Understanding Bpdu Guard
556
Understanding Port Fast
556
Understanding Bpdu Filtering
557
Understanding Uplinkfast
557
How Csuf Works
560
Understanding Backbonefast
561
Understanding Etherchannel Guard
564
Understanding Root Guard
564
Understanding Loop Guard
565
Enabling Port Fast
566
Enabling Bpdu Guard
567
Enabling Bpdu Filtering
568
Enabling Uplinkfast for Use with Redundant Links
569
Enabling Backbonefast
570
Enabling Etherchannel Guard
571
Enabling Loop Guard
572
Enabling Root Guard
572
Flex Links
575
Vlan Flex Link Load Balancing and Support
576
Flex Link Multicast Fast Convergence
577
Leaking Igmp Reports
578
Configuring Vlan Load Balancing on Flex Links
584
Understanding Dhcp Features
589
Dhcp Relay Agent
590
Dhcp Server
590
Dhcp Snooping
590
Cisco Ios Dhcp Server Database
594
Dhcp Snooping Binding Database
594
Dhcp Snooping and Switch Stacks
595
Configuring Dhcp Features
596
Default Dhcp Configuration
596
Dhcp Snooping Configuration Guidelines
597
Configuring the Dhcp Relay Agent
598
Configuring the Dhcp Server
598
Dhcp Server and Switch Stacks
598
Specifying the Packet Forwarding Address
599
Enabling Dhcp Snooping and Option 82
600
Enabling Dhcp Snooping on Private Vlans
602
Enabling the Cisco Ios Dhcp Server Database
602
Enabling the Dhcp Snooping Binding Database Agent
602
Displaying Dhcp Snooping Information
603
Source Ip Address Filtering
604
Understanding Ip Source Guard
604
Ip Source Guard for Static Hosts
605
Source Ip and Mac Address Filtering
605
Configuring Ip Source Guard
606
Default Ip Source Guard Configuration
606
Ip Source Guard Configuration Guidelines
606
Enabling Ip Source Guard
607
Configuring Ip Source Guard for Static Hosts
608
Configuring Ip Source Guard for Static Hosts on a Private Vlan Host Port
611
Displaying Ip Source Guard Information
613
Interface Trust States and Network Security
621
Rate Limiting of Arp Packets
622
Relative Priority of Arp Acls and Dhcp Snooping Entries
622
Default Dynamic Arp Inspection Configuration
623
Logging of Dropped Packets
623
Dynamic Arp Inspection Configuration Guidelines
624
Configuring Dynamic Arp Inspection in Dhcp Environments
625
Limiting the Rate of Incoming Arp Packets
629
Performing Validation Checks
630
Configuring the Log Buffer
631
Displaying Dynamic Arp Inspection Information
633
Understanding Igmp Snooping
636
Igmp Versions
637
Joining a Multicast Group
637
Leaving a Multicast Group
639
Igmp Report Suppression
640
Immediate Leave
640
Configuring Igmp Snooping
641
Default Igmp Snooping Configuration
641
Igmp Snooping and Switch Stacks
641
Enabling or Disabling Igmp Snooping
642
Setting the Snooping Method
642
Configuring a Host Statically to Join a Group
644
Configuring the Igmp Leave Timer
645
Enabling Igmp Immediate Leave
645
Configuring the Igmp Snooping Querier
648
Disabling Igmp Report Suppression
649
Displaying Igmp Snooping Information
650
Understanding Multicast Vlan Registration
651
Using Mvr in a Multicast Television Application
652
Configuring Mvr
654
Default Mvr Configuration
654
Mvr Configuration Guidelines and Limitations
654
Configuring Mvr Global Parameters
655
Configuring Mvr Interfaces
656
Displaying Mvr Information
657
Configuring Igmp Filtering and Throttling
658
Default Igmp Filtering and Throttling Configuration
658
Configuring Igmp Profiles
659
Applying Igmp Profiles
660
Configuring the Igmp Throttling Action
661
Setting the Maximum Number of Igmp Groups
661
Displaying Igmp Filtering and Throttling Configuration
663
Mld Messages
667
Mld Queries
667
Multicast Client Aging Robustness
667
Mld Reports
668
Multicast Router Discovery
668
Mld Snooping in Switch Stacks
669
Topology Change Notification Processing
669
Default Mld Snooping Configuration
670
Mld Snooping Configuration Guidelines
670
Enabling or Disabling Mld Snooping
671
Configuring a Static Multicast Group
672
Enabling Mld Immediate Leave
673
Configuring Mld Snooping Queries
674
Disabling Mld Listener Message Suppression
675
Displaying Mld Snooping Information
676
Configuring Storm Control
677
Understanding Storm Control
677
Configuring Storm Control and Threshold Levels
679
Default Storm Control Configuration
679
Configuring Protected Ports
682
Default Protected Port Configuration
682
Configuring a Protected Port
683
Configuring Port Blocking
683
Protected Port Configuration Guidelines
683
Blocking Flooded Traffic on an Interface
684
Configuring Port Security
684
Default Port Blocking Configuration
684
Understanding Port Security
685
Security Violations
686
Default Port Security Configuration
687
Port Security Configuration Guidelines
687
Enabling and Configuring Port Security
689
Enabling and Configuring Port Security Aging
693
Port Security and Private Vlans
694
Port Security and Switch Stacks
694
Configuring Cdp
697
Understanding Cdp
697
Cdp and Switch Stacks
698
Configuring the Cdp Characteristics
698
Default Cdp Configuration
698
Disabling and Enabling Cdp
699
Disabling and Enabling Cdp on an Interface
700
Monitoring and Maintaining Cdp
701
Wired Location Service
705
Default Lldp Configuration
707
Configuring Lldp Characteristics
708
Enabling Lldp
708
Configuring Location Tlv and Wired Location Service
711
Methods to Detect Unidirectional Links
716
Default Udld Configuration
718
Enabling Udld Globally
719
Enabling Udld on an Interface
720
Resetting an Interface Disabled by Udld
720
Displaying Udld Status
721
Local Span
724
Remote Span
725
Span and Rspan Concepts and Terminology
726
Span Sessions
726
Monitored Traffic
728
Destination Port
730
Vlan Filtering
730
Span and Rspan Interaction with Other Features
732
Span and Rspan and Switch Stacks
733
Configuring Local Span
734
Default Span and Rspan Configuration
734
Configuring Rspan
741
Rspan Configuration Guidelines
741
Creating an Rspan Source Session
742
Specifying Vlans to Filter
744
Creating an Rspan Destination Session and Configuring Incoming Traffic
747
Configuring Fspan and Frspan
749
Fspan and Frspan Configuration Guidelines
749
Configuring an Fspan Session
750
Configuring an Frspan Session
751
Configuring Rmon Alarms and Events
757
Default Rmon Configuration
757
Collecting Group History Statistics on an Interface
759
Collecting Group Ethernet Statistics on an Interface
760
Displaying Rmon Status
760
Configuring System Message Logging
763
Understanding System Message Logging
763
System Log Message Format
764
Default System Message Logging Configuration
766
Disabling Message Logging
766
Setting the Message Display Destination Device
767
Synchronizing Log Messages
768
Enabling and Disabling Sequence Numbers in Log Messages
770
Enabling and Disabling Time Stamps on Log Messages
770
Defining the Message Severity Level
771
Limiting Syslog Messages Sent to the History Table and to Snmp
772
Configuring Unix Syslog Servers
774
Logging Messages to a Unix Syslog Daemon
774
Configuring the Unix System Logging Facility
775
Displaying the Logging Configuration
776
Snmp Versions
778
Snmp Manager Functions
779
Snmp Agent Functions
780
Using Snmp to Access Mib Variables
780
Snmp Ifindex Mib Object Values
781
Snmp Notifications
781
Default Snmp Configuration
782
Disabling the Snmp Agent
783
Snmp Configuration Guidelines
783
Configuring Community Strings
784
Configuring Snmp Groups and Users
785
Configuring Snmp Notifications
788
Setting the Agent Contact and Location Information
792
Setting the Cpu Threshold Notification Types and Values
792
Limiting Tftp Servers Used through Snmp
793
Snmp Examples
794
Displaying Snmp Status
795
Event Detectors
799
Embedded Event Manager Actions
800
Embedded Event Manager Policies
800
Embedded Event Manager Environment Variables
801
Registering and Defining an Embedded Event Manager Applet
802
Registering and Defining an Embedded Event Manager Tcl Script
803
Displaying Embedded Event Manager Information
804
Supported Acls
806
Understanding Acls
806
Handling Fragmented and Unfragmented Traffic
809
Acls and Switch Stacks
810
Configuring Ipv4 Acls
811
Creating Standard and Extended Ipv4 Acls
812
Creating a Numbered Standard Acl
814
Applying an Ipv4 Acl to a Terminal Line
823
Including Comments in Acls
823
Applying an Ipv4 Acl to an Interface
824
Hardware and Software Treatment of Ip Acls
826
Troubleshooting Acls
826
Ipv4 Acl Configuration Examples
827
Extended Acls
829
Numbered Acls
829
Commented Ip Acl Entries
830
Named Acls
830
Time Range Applied to an Ip Acl
830
Acl Logging
831
Creating Named Mac Extended Acls
832
Applying a Mac Acl to a Layer 2 Interface
834
Configuring Vlan Maps
835
Vlan Map Configuration Guidelines
835
Creating a Vlan Map
836
Applying a Vlan Map to a Vlan
839
Using Vlan Maps in Your Network
839
Wiring Closet Configuration
839
Denying Access to a Server on Another a Vlan
840
Using Vlan Maps with Router Acls
841
Vlan Maps and Router Acl Configuration Guidelines
842
Examples of Router Acls and Vlan Maps Applied to Vlans
843
Displaying Ipv4 Acl Configuration
845
Supported Acl Features
848
Ipv6 Acl Limitations
849
Ipv6 Acls and Switch Stacks
849
Creating Ipv6 Acls
850
Default Ipv6 Acl Configuration
850
Interaction with Other Features and Switches
850
Applying an Ipv6 Acl to an Interface
853
Displaying Ipv6 Acls
854
Configuring Qos
855
Understanding Qos
856
Basic Qos Model
858
Policing and Marking
863
Policing on Svis
865
Mapping Tables
867
Queueing and Scheduling Overview
868
Weighted Tail Drop
869
Packet Modification
876
Configuring Standard Qos
890
Default Standard Qos Configuration
890
Default Ingress Queue Configuration
891
Default Egress Queue Configuration
892
Standard Qos Configuration Guidelines
893
Policing Guidelines
894
Enabling Qos Globally
895
Configuring Classification Using Port Trust States
897
Configuring a Qos Policy
903
Configuring Dscp Maps
927
Configuring Ingress Queue Characteristics
933
Allocating Bandwidth between the Ingress Queues
935
Allocating Buffer Space between the Ingress Queues
935
Configuring Egress Queue Characteristics
937
Displaying Standard Qos Information
945
Understanding Etherchannels
947
Etherchannel Overview
948
Port Aggregation Protocol
951
Link Aggregation Control Protocol
953
Etherchannel on Mode
954
Etherchannel and Switch Stacks
956
Configuring Etherchannels
957
Default Etherchannel Configuration
957
Etherchannel Configuration Guidelines
958
Configuring Layer 2 Etherchannels
959
Configuring Layer 3 Etherchannels
961
Configuring the Physical Interfaces
962
Configuring the Pagp Learn Method and Priority
965
Configuring Telepresence E911 Ip Phone Support
975
Understanding Telepresence E911 Ip Phone Support
975
Enabling Telepresence E911 Ip Phone Support
977
Configuring Ip Unicast Routing
979
Types of Routing
980
Understanding Ip Routing
980
Ip Routing and Switch Stacks
981
Configuring Ip Addressing
983
Steps for Configuring Routing
983
Default Addressing Configuration
984
Assigning Ip Addresses to Network Interfaces
985
Classless Routing
986
Configuring Address Resolution Methods
987
Set Arp Encapsulation
989
Default Gateway
990
Routing Assistance When Ip Routing Is Disabled
990
Configuring Broadcast Packet Handling
992
Monitoring and Maintaining Ip Addressing
996
Enabling Ip Unicast Routing
997
Configuring Rip
998
Configuring Basic Rip Parameters
999
Default Rip Configuration
999
Configuring Rip Authentication
1001
Configuring Summary Addresses and Split Horizon
1001
Configuring Split Horizon
1003
Configuring Ospf
1004
Default Ospf Configuration
1005
Ospf Nonstop Forwarding
1006
Configuring Basic Ospf Parameters
1008
Configuring Ospf Interfaces
1008
Configuring Ospf Area Parameters
1010
Configuring Other Ospf Parameters
1011
Changing Lsa Group Pacing
1013
Configuring a Loopback Interface
1013
Configuring Eigrp
1014
Monitoring Ospf
1014
Default Eigrp Configuration
1016
Configuring Basic Eigrp Parameters
1018
Configuring Eigrp Interfaces
1019
Configuring Eigrp Route Authentication
1020
Eigrp Stub Routing
1021
Configuring Bgp
1022
Monitoring and Maintaining Eigrp
1022
Default Bgp Configuration
1024
Nonstop Forwarding Awareness
1026
Enabling Bgp Routing
1027
Managing Routing Policy Changes
1029
Configuring Bgp Decision Attributes
1031
Configuring Bgp Filtering by Neighbor
1033
Configuring Bgp Filtering with Route Maps
1033
Configuring Prefix Lists for Bgp Filtering
1035
Configuring Bgp Community Filtering
1036
Configuring Bgp Neighbors and Peer Groups
1037
Configuring Aggregate Addresses
1039
Configuring Bgp Route Reflectors
1040
Configuring Routing Domain Confederations
1040
Configuring Route Dampening
1041
Monitoring and Maintaining Bgp
1042
Configuring Iso Clns Routing
1043
Configuring Vrfs
1057
User Interface for Traceroute
1061
Configuring a Vpn Routing Session
1062
Configuring Multicast Vrfs
1062
Configuring Bgp Pe to Ce Routing Sessions
1063
Configuring Distributed Cisco Express Forwarding
1068
Configuring Unicast Reverse Path Forwarding
1068
Configuring Static Unicast Routes
1071
Specifying Default Routes and Networks
1072
Using Route Maps to Redistribute Routing Information
1072
Pbr Configuration Guidelines
1077
Enabling Pbr
1078
Filtering Routing Information
1079
Managing Authentication Keys
1082
Monitoring and Maintaining the Ip Network
1083
Understanding Ipv6
1085
Ipv6 Addresses
1086
Supported Ipv6 Unicast Routing Features
1087
Neighbor Discovery
1088
Unsupported Ipv6 Unicast Routing Features
1092
Ipv6 and Switch Stacks
1093
Configuring Ipv6
1094
Configuring Ipv6 Addressing and Enabling Ipv6 Routing
1095
Default Ipv6 Configuration
1095
Configuring Default Router Preference
1097
Configuring Ipv4 and Ipv6 Protocol Stacks
1098
Configuring Dhcp for Ipv6 Address Assignment
1099
Default Dhcpv6 Address Assignment Configuration
1099
Dhcpv6 Address Assignment Configuration Guidelines
1099
Enabling Dhcpv6 Server Function
1100
Enabling Dhcpv6 Client Function
1102
Configuring Cef and Dcef for Ipv6
1103
Configuring Ipv6 Icmp Rate Limiting
1103
Configuring Static Routing for Ipv6
1104
Configuring Rip for Ipv6
1105
Configuring Ospf for Ipv6
1106
Configuring Eigrp for Ipv6
1108
Configuring Hsrp for Ipv6
1108
Displaying Ipv6
1111
Hsrp Versions
1115
Multiple Hsrp
1116
Default Hsrp Configuration
1117
Hsrp and Switch Stacks
1117
Enabling Hsrp
1118
Hsrp Configuration Guidelines
1118
Configuring Hsrp Priority
1120
Configuring Hsrp Authentication and Timers
1122
Configuring Mhsrp
1122
Configuring Hsrp Groups and Clustering
1124
Enabling Hsrp Support for Icmp Redirect Messages
1124
Displaying Hsrp Configurations
1125
Understanding Cisco Ios Ip Slas
1127
Using Cisco Ios Ip Slas to Measure Network Performance
1129
Ip Slas Responder and Ip Slas Control Protocol
1130
Response Time Computation for Ip Slas
1130
Ip Slas Operation Scheduling
1131
Ip Slas Operation Threshold Monitoring
1131
Configuring Ip Slas Operations
1132
Configuring the Ip Slas Responder
1133
Analyzing Ip Service Levels by Using the Udp Jitter Operation
1134
Analyzing Ip Service Levels by Using the Icmp Echo Operation
1137
Monitoring Ip Slas Operations
1139
Understanding Enhanced Object Tracking
1141
Configuring Enhanced Object Tracking Features
1142
Configuring a Tracked List
1143
Configuring Hsrp Object Tracking
1147
Configuring Ip Slas Object Tracking
1148
Configuring Other Tracking Characteristics
1148
Configuring a Primary Interface
1150
Configuring Static Routing Support
1150
Monitoring Enhanced Object Tracking
1152
Understanding Wccp
1156
Wccp Message Exchange
1156
Md5 Security
1157
Packet Redirection and Service Groups
1157
Wccp Negotiation
1157
Wccp and Switch Stacks
1158
Configuring Wccp
1159
Default Wccp Configuration
1159
Unsupported Wccp Features
1159
Wccp Configuration Guidelines
1159
Monitoring and Maintaining Wccp
1164
Igmp Version 1
1167
Igmp Version 2
1167
Understanding Igmp
1167
Pim Modes
1168
Understanding Pim
1168
Igmp Helper
1170
Multicast Forwarding and Reverse Path Check
1172
Understanding Cgmp
1173
Understanding Dvmrp
1173
Multicast Routing and Switch Stacks
1174
Default Multicast Routing Configuration
1175
Multicast Routing Configuration Guidelines
1175
Configuring Basic Multicast Routing
1176
Configuring Source Specific Multicast Mapping
1181
Monitoring Ssm
1181
Ssm Mapping Overview
1182
Configuring Ssm Mapping
1183
Monitoring Ssm Mapping
1185
Configuring Pim Stub Routing
1186
Configuring a Rendezvous Point
1187
Configuring Pimv2 Bsr
1193
Configuring Advanced Pim Features
1199
Monitoring the Rp Mapping Information
1199
Troubleshooting Pimv1 and Pimv2 Interoperability Problems
1199
Understanding Pim Shared Tree and Source Tree
1199
Configuring Optional Igmp Features
1202
Configuring the Switch as a Member of a Group
1203
Default Igmp Configuration
1203
Controlling Access to Ip Multicast Groups
1204
Changing the Igmp Version
1205
Changing the Igmp Query Timeout for Igmpv2
1206
Changing the Maximum Query Response Time for Igmpv2
1207
Configuring Optional Multicast Routing Features
1208
Configuring the Switch as a Statically Connected Member
1208
Enabling Cgmp Server Support
1209
Configuring Sdr Listener Support
1210
Configuring an Ip Multicast Boundary
1211
Configuring Basic Dvmrp Interoperability Features
1213
Configuring Dvmrp Interoperability
1213
Configuring a Dvmrp Tunnel
1215
Configuring Advanced Dvmrp Interoperability Features
1218
Enabling Dvmrp Unicast Routing
1218
Responding to Mrinfo Requests
1218
Rejecting a Dvmrp Nonpruning Neighbor
1219
Controlling Route Exchanges
1222
Displaying System and Network Statistics
1227
Monitoring and Maintaining Ip Multicast Routing
1227
Monitoring Ip Multicast Routing
1228
Msdp Operation
1230
Msdp Benefits
1231
Configuring a Default Msdp Peer
1232
Default Msdp Configuration
1232
Controlling Source Information that Your Switch Originates
1236
Requesting Source Information from an Msdp Peer
1236
Redistributing Sources
1237
Controlling Source Information that Your Switch Forwards
1240
Controlling Source Information that Your Switch Receives
1242
Configuring an Msdp Mesh Group
1244
Shutting down an Msdp Peer
1244
Configuring an Originating Address Other than the Rp Address
1246
Monitoring and Maintaining Msdp
1247
Default Fallback Bridging Configuration
1251
Fallback Bridging and Switch Stacks
1251
Creating a Bridge Group
1252
Fallback Bridging Configuration Guidelines
1252
Adjusting Bpdu Intervals
1255
Monitoring and Maintaining Fallback Bridging
1258
Troubleshooting
1259
Recovering from a Software Failure
1260
Recovering from a Lost or Forgotten Password
1261
Procedure with Password Recovery Enabled
1262
Procedure with Password Recovery Disabled
1264
Preventing Switch Stack Problems
1266
Recovering from a Command Switch Failure
1267
Replacing a Failed Command Switch with a Cluster Member
1267
Replacing a Failed Command Switch with Another Switch
1269
Recovering from Lost Cluster Member Connectivity
1270
Disabled Port Caused by Power Loss
1271
Preventing Autonegotiation Mismatches
1271
Troubleshooting Power over Ethernet Switch Ports
1271
Disabled Port Caused by False Link up
1272
Monitoring Sfp Module Status
1272
Sfp Module Security and Identification
1272
Executing Ping
1273
Monitoring Temperature
1273
Understanding Ping
1273
Using Ping
1273
Understanding Layer 2 Traceroute
1274
Using Layer 2 Traceroute
1274
Displaying the Physical Path
1275
Usage Guidelines
1275
Executing Ip Traceroute
1276
Understanding Ip Traceroute
1276
Using Ip Traceroute
1276
Understanding Tdr
1277
Using Tdr
1277
Running Tdr and Displaying the Results
1278
Using Debug Commands
1278
Enabling Debugging on a Specific Feature
1279
Redirecting Debug and Error Message Output
1280
Using the Show Platform Forward Command
1280
Using the Crashinfo Files
1282
Basic Crashinfo Files
1283
Extended Crashinfo Files
1283
Configuring Obfl
1284
Understanding Obfl
1284
Displaying Obfl Information
1285
Troubleshooting Cpu Utilization
1286
Troubleshooting Tables
1286
Scheduling Online Diagnostics
1294
Running Online Diagnostic Tests
1297
Starting Online Diagnostic Tests
1297
Displaying Online Diagnostic Tests and Test Results
1298
Mib List
1299
Supported Mibs
1299
Using Ftp to Access the Mib Files
1302
Working with the Flash File System
1303
Displaying Available File Systems
1304
Displaying Information about Files on a File System
1305
Setting the Default File System
1305
Changing Directories and Displaying the Working Directory
1306
Copying Files
1307
Creating and Removing Directories
1307
Deleting Files
1308
Working with Configuration Files
1311
Configuration File Types and Location
1312
Guidelines for Creating and Using Configuration Files
1312
Copying Configuration Files by Using Tftp
1313
Creating a Configuration File by Using a Text Editor
1313
Copying Configuration Files by Using Ftp
1315
Copying Configuration Files by Using Rcp
1319
Uploading a Configuration File by Using Rcp
1321
Clearing Configuration Information
1322
Clearing the Startup Configuration File
1322
Deleting a Stored Configuration File
1322
Replacing and Rolling Back Configurations
1322
Working with Software Images
1327
Image Location on the Switch
1328
Copying Image Files by Using Tftp
1329
Copying Image Files by Using Ftp
1333
Copying Image Files by Using Rcp
1337
Copying an Image File from One Stack Member to Another
1341
Access Control Lists
1343
Archive Commands
1344
Arp Commands
1344
Boot Loader Commands
1344
Debug Commands
1345
Embedded Event Manager
1345
Unsupported Commands in Applet Configuration Mode
1345
Fallback Bridging
1346
Unsupported Commands in Event Trigger Configuration Mode
1346
Igmp Snooping Commands
1348
Interface Commands
1348
Ip Multicast Routing
1349
Ip Unicast Routing
1350
Unsupported Privileged Exec or User Exec Commands
1350
Unsupported Bgp Router Configuration Commands
1351
Unsupported Route Map Commands
1351
Unsupported Vpn Configuration Commands
1351
Mac Address Commands
1352
Netflow Commands
1353
Unsupported Global Configuration Command
1354
Spanning Tree
1355
Unsupported Interface Configuration Command
1355
Unsupported Privileged Exec Command
1355
Advertisement
Advertisement
Related Products
Cisco Catalyst 3550 Series
Cisco Catalyst 3560 Series
Cisco Catalyst 3000 Series
Cisco Catalyst 3900 Series
Cisco Catalyst-3750G-48PS
Cisco Catalyst-3750E-48PD-F
Cisco Catalyst 3850 series
Cisco Catalyst 3650 Series
Cisco Catalyst 3500 Series
Cisco Catalyst 2924M XL
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL