Summary of Contents for Cisco ME 3400G-2CS - Ethernet Access Switch
Page 1
Cisco ME 3400 Ethernet Access Switch Software Configuration Guide Cisco IOS Release 12.2(25)EX November 2005 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7817058=...
Page 2
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the...
Page 3
Security Features Subscriber Security Switch Security Network Security Quality of Service and Class of Service Features Layer 2 Virtual Private Network Services Layer 3 Features Layer 3 VPN Services Monitoring Features Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Understanding DHCP-Based Autoconfiguration DHCP Client Request Process Configuring DHCP-Based Autoconfiguration DHCP Server Configuration Guidelines Configuring the TFTP Server Configuring the DNS Configuring the Relay Device Obtaining Configuration Files Example Configuration Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 5
Enabling a Partial Configuration 4-11 Displaying CNS Configuration 4-12 Administering the Switch C H A P T E R Managing the System Time and Date Understanding the System Clock Understanding Network Time Protocol Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 6
Adding and Removing Static Address Entries 5-24 Configuring Unicast MAC Address Filtering 5-25 Disabling MAC Address Learning on a VLAN 5-26 Displaying Address Table Entries 5-28 Managing the ARP Table 5-28 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 7
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services 7-16 Starting TACACS+ Accounting 7-17 Displaying the TACACS+ Configuration 7-17 Controlling Switch Access with RADIUS 7-18 Understanding RADIUS 7-18 RADIUS Operation 7-19 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 8
Ports in Authorized and Unauthorized States IEEE 802.1x Accounting IEEE 802.1x Accounting Attribute-Value Pairs IEEE 802.1x Host Mode Using IEEE 802.1x with Port Security Using IEEE 802.1x with VLAN Assignment Cisco ME 3400 Ethernet Access Switch Software Configuration Guide viii 78-17058-01...
Page 9
Configuring User Network and Network Node Interfaces 9-13 Configuring Interface Speed and Duplex Mode 9-14 Speed and Duplex Configuration Guidelines 9-15 Setting the Interface Speed and Duplex Parameters 9-15 Configuring IEEE 802.3x Flow Control 9-17 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 10
Creating an Extended-Range VLAN with an Internal VLAN ID 11-11 Configuring UNI VLANs 11-12 Configuration Guidelines 11-12 Configuring UNI VLANs 11-13 Displaying VLANs 11-14 Configuring VLAN Trunks 11-14 Trunking Overview 11-14 IEEE 802.1Q Configuration Considerations 11-15 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 11
Default Private-VLAN Configuration 12-6 Private-VLAN Configuration Guidelines 12-6 Secondary and Primary VLAN Configuration 12-7 Private-VLAN Port Configuration 12-8 Limitations with Other Features 12-9 Configuring and Associating VLANs in a Private VLAN 12-10 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 12
14-7 How a Switch or Port Becomes the Root Switch or Root Port 14-7 Spanning Tree and Redundant Connectivity 14-8 Spanning-Tree Address Management 14-8 Accelerated Aging to Retain Connectivity 14-9 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 13
Rapid Convergence 15-7 Synchronization of Port Roles 15-8 Bridge Protocol Data Unit Format and Processing 15-9 Processing Superior BPDU Information 15-10 Processing Inferior BPDU Information 15-10 Topology Changes 15-10 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xiii 78-17058-01...
Page 14
16-5 Enabling Port Fast 16-5 Enabling BPDU Guard 16-6 Enabling BPDU Filtering 16-7 Enabling EtherChannel Guard 16-8 Enabling Root Guard 16-9 Enabling Loop Guard 16-9 Displaying the Spanning-Tree Status 16-10 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 15
Source IP and MAC Address Filtering 18-14 Configuring IP Source Guard 18-14 Default IP Source Guard Configuration 18-14 IP Source Guard Configuration Guidelines 18-15 Enabling IP Source Guard 18-15 Displaying IP Source Guard Information 18-16 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 16
20-11 Recovering from Flood Mode 20-11 Disabling Multicast Flooding During a TCN Event 20-12 Configuring the IGMP Snooping Querier 20-13 Disabling IGMP Report Suppression 20-14 Displaying IGMP Snooping Information 20-15 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 17
Default Port Security Configuration 21-10 Port Security Configuration Guidelines 21-10 Enabling and Configuring Port Security 21-11 Enabling and Configuring Port Security Aging 21-15 Displaying Port-Based Traffic Control Settings 21-17 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xvii 78-17058-01...
Page 18
24-6 VLAN Filtering 24-6 Destination Port 24-7 RSPAN VLAN 24-8 SPAN and RSPAN Interaction with Other Features 24-8 Configuring SPAN and RSPAN 24-9 Default SPAN and RSPAN Configuration 24-10 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xviii 78-17058-01...
Page 19
Limiting Syslog Messages Sent to the History Table and to SNMP 26-9 Configuring UNIX Syslog Servers 26-10 Logging Messages to a UNIX Syslog Daemon 26-10 Configuring the UNIX System Logging Facility 26-11 Displaying the Logging Configuration 26-12 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 20
Resequencing ACEs in an ACL 28-14 Creating Named Standard and Extended ACLs 28-14 Using Time Ranges with ACLs 28-16 Including Comments in ACLs 28-18 Applying an IPv4 ACL to a Terminal Line 28-18 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 21
Configuring QoS 30-1 C H A P T E R Understanding QoS 30-1 Modular QoS CLI 30-3 Input and Output Policies 30-4 Input Policy Maps 30-4 Output Policy Maps 30-5 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 22
Configuring Output Policy Maps with Class-Based Shaping 30-46 Configuring Output Policy Maps with Port Shaping 30-47 Configuring Output Policy Maps with Class-Based Priority Queuing 30-48 Configuring Output Policy Maps with Weighted Tail Drop 30-53 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xxii 78-17058-01...
Page 23
Configuring the PAgP Learn Method and Priority 31-17 Configuring LACP Hot-Standby Ports 31-18 Configuring the LACP System Priority 31-19 Configuring the LACP Port Priority 31-20 Displaying EtherChannel, PAgP, and LACP Status 31-21 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xxiii 78-17058-01...
Page 24
Configuring Basic OSPF Parameters 32-26 Configuring OSPF Interfaces 32-26 Configuring OSPF Area Parameters 32-27 Configuring Other OSPF Parameters 32-29 Changing LSA Group Pacing 32-30 Configuring a Loopback Interface 32-31 Monitoring OSPF 32-31 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xxiv 78-17058-01...
Page 25
Configuring Static Unicast Routes 32-71 Specifying Default Routes and Networks 32-72 Using Route Maps to Redistribute Routing Information 32-73 Configuring Policy-Based Routing 32-76 PBR Configuration Guidelines 32-77 Enabling PBR 32-78 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 27
35-2 MSDP Benefits 35-3 Configuring MSDP 35-4 Default MSDP Configuration 35-4 Configuring a Default MSDP Peer 35-4 Caching Source-Active State 35-6 Requesting Source Information from an MSDP Peer 35-8 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xxvii 78-17058-01...
Page 28
36-13 Understanding Layer 2 Traceroute 36-13 Layer 2 Traceroute Usage Guidelines 36-14 Displaying the Physical Path 36-15 Using IP Traceroute 36-15 Understanding IP Traceroute 36-15 Executing IP Traceroute 36-16 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xxviii 78-17058-01...
Page 29
A P P E N D I X MIB List Using FTP to Access the MIB Files Working with the Cisco IOS File System, Configuration Files, and Software Images A P P E N D I X Working with the Flash File System...
Page 30
Working with Software Images B-18 Image Location on the Switch B-19 tar File Format of Images on a Server or Cisco.com B-19 Copying Image Files By Using TFTP B-20 Preparing to Download or Upload an Image File By Using TFTP...
Page 31
Unsupported Privileged EXEC Commands Unsupported Global Configuration Commands NetFlow Commands Unsupported Global Configuration Commands Unsupported Global Configuration Commands Unsupported Interface Configuration Commands RADIUS Unsupported Global Configuration Commands SNMP Unsupported Global Configuration Commands Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xxxi 78-17058-01...
Page 32
Contents Spanning Tree Unsupported Global Configuration Command Unsupported Interface Configuration Command VLAN C-10 Unsupported Global Configuration Commands C-10 Unsupported User EXEC Commands C-10 N D E X Cisco ME 3400 Ethernet Access Switch Software Configuration Guide xxxii 78-17058-01...
Page 33
This guide is for the networking professional managing the Cisco Metro Ethernet (ME) 3400 Series Ethernet Access switch, hereafter referred to as the switch. Before using this guide, you should have experience working with the Cisco IOS software and be familiar with the concepts and terminology of Ethernet and local area networking.
For upgrading information, see the “Downloading Software” section in the release notes. • You can order printed copies of documents with a DOC-xxxxxx= number from the Cisco.com sites and from the telephone numbers listed in the “Obtaining Documentation” section on page xxxv.
Cisco products and to view technical documentation in HTML. With the DVD, you have access to the same documentation that is found on the Cisco website without being connected to the Internet. Certain products also have .pdf versions of the documentation available.
Register to receive security information from Cisco. • A current list of security advisories and notices for Cisco products is available at this URL: http://www.cisco.com/go/psirt If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL: http://www.cisco.com/en/US/products/products_psirt_rss_feed.html...
Obtaining Technical Assistance Reporting Security Problems in Cisco Products Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT: Emergencies —...
Cisco engineer. The TAC Service Request Tool is located at this URL: http://www.cisco.com/techsupport/servicerequest For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.
Visit Cisco Marketplace, the company store, at this URL: http://www.cisco.com/go/marketplace/ Cisco Press publishes a wide range of general networking, training and certification titles. Both new • and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL: http://www.ciscopress.com...
Page 40
Preface Obtaining Additional Publications and Information Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 41
Cisco.com. For more information, see the release notes for this release. The Cisco ME switch has two different types of interfaces: network node interfaces (NNIs) to connect to the service provider network and user network interfaces (UNIs) to connect to customer networks.
IGMP snooping querier support to configure switch to generate periodic IGMP General Query • messages Multicast VLAN registration (MVR) to continuously send multicast streams in a multicast VLAN • while isolating the streams from subscriber VLANs for bandwidth and security reasons Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
• Cisco Configuration Engine—The Cisco Configuration Engine is a network management device that works with embedded Cisco IOS CNS Agents in the switch software. You can automate initial configurations and configuration updates by generating switch-specific configuration changes, sending them to the switch, executing the configuration change, and logging the results. For more information about using Cisco IOS agents, see Chapter 4, “Configuring Cisco IOS CNS Agents.”...
Chapter 1 Overview Features • Cisco IOS File System (IFS) for providing a single interface to all file systems that the switch uses In-band management access for up to 16 simultaneous Telnet connections for multiple CLI-based • sessions over the network •...
The Kerberos feature listed in this section is only available on the cryptographic versions of the switch software. Password-protected access (read-only and read-write access) to management interfaces for • protection against unauthorized configuration changes Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
IEEE 802.1x accounting to track network usage Quality of Service and Class of Service Features • Cisco modular quality of service (QoS) command-line (MQC) implementation • Classification based on IP precedence, Differentiated Services Code Point (DSCP), and IEEE 802.1p class of service (CoS) packet fields, ACL lookup, or assigning a QoS label for output classification •...
• Internet Control Message Protocol (ICMP) and ICMP Router Discovery Protocol (IRDP) for using router advertisement and router solicitation messages to discover the addresses of routers on directly attached subnets Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
If you have specific network needs, you can change the interface-specific and system-wide settings. For information about assigning an IP address by using the CLI-based setup program, see the hardware Note installation guide. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 49
Private VLANs None configured Chapter 12, “Configuring Private VLANs” • Dynamic ARP inspection (requires Disabled on all VLANs Chapter 19, “Configuring Dynamic ARP metro IP access or metro access Inspection” image) Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 50
SPAN and RSPAN Disabled Chapter 24, “Configuring SPAN and RSPAN” RMON Disabled Chapter 25, “Configuring RMON” Syslog messages Enabled; displayed on the console Chapter 26, “Configuring System Message Logging” Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 1-10 78-17058-01...
Gigabit Ethernet ring for a residential location, serving multitenant units by using Cisco ME 3400 Ethernet Access switches connected through 1000BASE-X SFP module ports. Cisco ME switches used as residential switches provide customers with high-speed connections to the service provider point-of presence (POP).
Page 52
To provide differential QoS treatment for different types of traffic, the Cisco ME switch can identify, police, mark, and schedule traffic types based on Layer 2 to Layer 4 information. The Cisco modular QoS command-line interface (CLI), or MQC, on Cisco ME switches provides an efficient method of QoS configuration.
VLAN ID on top of the customer’s IEEE 802.1Q tag. By supporting double tags, the Cisco ME 3400 switch provides a virtual tunnel for each customer and prevents VLAN ID overlaps between customers. In addition to data-plane separation, the Cisco ME 3400 switch can also tunnel the customer’s control protocols.
• link to one or more provider edge routers. The CE device advertises the site’s local routes to the router and learns the remote VPN routes from the router. The Cisco ME 3400 switch can be a CE device. •...
C H A P T E R Using the Command-Line Interface This chapter describes the Cisco IOS command-line interface (CLI) and how to use it to configure your Cisco ME 3400 Ethernet Access switch. It contains these sections: Understanding Command Modes, page 2-1 •...
Page 58
To return to console command. privileged EXEC mode, press Ctrl-Z or enter end. For more detailed information on the command modes, see the command reference guide for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
You need to enter only enough characters for the switch to recognize the command as unique. This example shows how to enter the show configuration privileged EXEC command in an abbreviated form: Switch# show conf Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
You can customize this feature to suit your needs as described in these sections: Changing the Command History Buffer Size, page 2-5 (optional) • Recalling Commands, page 2-5 (optional) • Disabling the Command History Feature, page 2-5 (optional) • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
To disable the feature during the current terminal session, enter the terminal no history privileged EXEC command. To disable command history for the line, enter the no history line configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Recall commands from the buffer and Press Ctrl-Y. Recall the most recent entry in the buffer. paste them in the command line. The switch provides a buffer with the last ten items that you deleted. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 63
Press Ctrl-L or Ctrl-R. Redisplay the current command line. if the switch suddenly sends a message to your screen. 1. The arrow keys function only on ANSI-compatible terminals such as VT100s. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Switch# show interfaces | include protocol Vlan1 is up, line protocol is up Vlan10 is up, line protocol is down GigabitEthernet0/1 is up, line protocol is down GigabitEthernet0/2 is up, line protocol is up Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
7-37. The switch supports up to five simultaneous secure SSH sessions. After you connect through the console port, through a Telnet session or through an SSH session, the user EXEC prompt appears on the management station. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 66
Chapter 2 Using the Command-Line Interface Accessing the CLI Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 2-10 78-17058-01...
For complete syntax and usage information for the commands used in this chapter, see the command Note reference for this release and to the Cisco IOS IP Command Reference, Volume 1 of 3: Addressing and Services, Release 12.2. This chapter consists of these sections: •...
IP address and reads the configuration file. If you are an experienced user familiar with the switch configuration steps, manually configure the switch. Otherwise, use the setup program described previously. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
DHCP server when the configuration file is not present on the switch. If the configuration file is present and the configuration includes the ip address dhcp interface configuration command on specific routed interfaces, the DHCP client is invoked and requests the IP address information for those interfaces. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 70
If the switch accepts replies from a BOOTP server and configures itself, the switch broadcasts, instead of unicasts, TFTP requests to obtain the switch configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Example Configuration, page 3-8 • If your DHCP server is a Cisco device, see the “Configuring DHCP” section of the “IP Addressing and Services” section of the Cisco IOS IP Configuration Guide, Release 12.2 for additional information about configuring DHCP.
If the relay device is a Cisco router, enable IP routing (ip routing global configuration command), and configure helper addresses by using the ip helper-address interface configuration command.
DHCP reply. If the hostname is not specified in the DHCP reply, the switch uses the default Switch as its hostname. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
The range is 1 to 4094; do not enter leading zeros. Step 3 ip address ip-address subnet-mask Enter the IP address and subnet mask. Step 4 exit Return to global configuration mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 77
Vlan10 ip address 192.168.1.76 255.255.255.0 ip default-gateway 192.168.1.3 no ip http server ip classless control-plane line con 0 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 3-11 78-17058-01...
EXEC command. For more information about alternative locations from which to copy the configuration file, see Appendix B, “Working with the Cisco IOS File System, Configuration Files, and Software Images.” Modifying the Startup Configuration These sections describe how to modify the switch startup configuration: •...
Specifying the Filename to Read and Write the System Configuration By default, the Cisco IOS software uses the file config.text to read and write a nonvolatile copy of the system configuration. However, you can specify a different filename, which will be loaded during the next boot cycle.
For filesystem:, use flash: for the system board flash device. • For file-url, specify the path (directory) and the name of the bootable image. Filenames and directory names are case sensitive. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 3-14 78-17058-01...
Environment variables store two kinds of data: • Data that controls code, which does not read the Cisco IOS configuration file. For example, the name of a boot loader helper file, which extends or patches the functionality of the boot loader can be stored as an environment variable.
Scheduling a Reload of the Software Image You can change the settings of the environment variables by accessing the boot loader or by using Cisco IOS commands. Under normal circumstances, it is not necessary to alter the setting of the environment variables.
Reload scheduled for 02:00:00 UTC Thu Jun 20 1996 (in 344 hours and 53 minutes) Proceed with reload? [confirm] To cancel a previously scheduled reload, use the reload cancel privileged EXEC command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 3-17 78-17058-01...
EXEC command. It displays reload information including the time the reload is scheduled to occur and the reason for the reload (if it was specified when the reload was scheduled). Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 3-18 78-17058-01...
C H A P T E R Configuring Cisco IOS CNS Agents This chapter describes how to configure the Cisco IOS CNS agents on the Cisco ME 3400 switch. For complete configuration information for the Cisco Configuration Engine, see this URL on Cisco.com Note http://www.cisco.com/en/US/products/sw/netmgtsw/ps4617/tsd_products_support_series_home.html...
URLs that reference the device-specific configuration information stored in a directory. The Cisco IOS agent can perform a syntax check on received configuration files and publish events to show the success or failure of the syntax check. The configuration agent can either apply configurations immediately or delay the application until receipt of a synchronization event from the configuration server.
Understanding Cisco Configuration Engine Software Event Service The Cisco Configuration Engine uses the Event Service for receipt and generation of configuration events. The event agent is on the switch and facilitates the communication between the switch and the event gateway on the Configuration Engine.
Therefore, the DeviceID, as originated on the switch, must match the DeviceID of the corresponding switch definition in the Configuration Engine. The origin of the DeviceID is defined by the Cisco IOS hostname of the switch. However, the DeviceID variable and its usage reside within the event gateway adjacent to the switch.
Understanding Cisco IOS Agents The CNS event agent feature allows the switch to publish and subscribe to events on the event bus and works with the Cisco IOS agent. The Cisco IOS agent feature supports the switch by providing these features: •...
NVRAM for use at the next reboot. Configuring Cisco IOS Agents The Cisco IOS agents embedded in the switch Cisco IOS software allow the switch to be connected and automatically configured as described in the “Enabling Automated CNS Configuration” section on page 4-6.
Page 91
For more information about running the setup program and creating templates on the Configuration Note Engine, see the Cisco Configuration Engine Installation and Setup Guide, 1.5 for Linux at this URL: http://www.cisco.com/en/US/products/sw/netmgtsw/ps4617/products_installation_and_configuration_ guide_book09186a00803b59db.html...
This example shows how to enable the CNS event agent, set the IP address gateway to 10.180.1.27, set 120 seconds as the keepalive interval, and set 10 as the retry count. Switch(config)# cns event 10.180.1.27 keepalive 120 10 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents Enabling the Cisco IOS CNS Agent After enabling the CNS event agent, start the Cisco IOS CNS agent on the switch. You can enable the Cisco IOS agent with these commands: •...
Page 94
ID, or enter an arbitrary text string for string string as the unique ID. Step 8 cns config initial {ip-address | hostname} Enable the Cisco IOS agent, and initiate an initial [port-number] [event] [no-persist] [page page] configuration. [source ip-address] [syntax-check] For {ip-address | hostname}, enter the IP address or •...
RemoteSwitch(config)# cns id Ethernet 0 ipaddress RemoteSwitch(config)# cns config initial 10.1.1.1 no-persist Enabling a Partial Configuration Beginning in privileged EXEC mode, follow these steps to enable the Cisco IOS agent and to initiate a partial configuration on the switch: Command...
Displaying CNS Configuration Command Purpose show cns config connections Displays the status of the CNS Cisco IOS agent connections. show cns config outstanding Displays information about incremental (partial) CNS configurations that have started but are not yet completed. show cns config stats Displays statistics about the Cisco IOS agent.
You can manage the system time and date on your switch using automatic configuration, such as the Network Time Protocol (NTP), or manual configuration methods. Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. These sections contain this configuration information: •...
The time kept on a device is a critical resource; you should use the security features of NTP to avoid the accidental or malicious setting of an incorrect time. Two mechanisms are available: an access list-based restriction scheme and an encrypted authentication mechanism. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 100
Managing the System Time and Date Cisco’s implementation of NTP does not support stratum 1 service; it is not possible to connect to a radio or atomic clock. We recommend that the time service for your network be derived from the public NTP servers available on the IP Internet.
No access control is specified. NTP packet source IP address The source address is set by the outgoing interface. NTP is enabled on all interfaces by default. All interfaces receive NTP packets. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
This example shows how to configure the switch to synchronize only to devices providing authentication key 42 in the device’s NTP packets: Switch(config)# ntp authenticate Switch(config)# ntp authentication-key 42 md5 aNiceKey Switch(config)# ntp trusted-key 42 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
This example shows how to configure the switch to synchronize its system clock with the clock of the peer at IP address 172.16.22.44 using NTP Version 2: Switch(config)# ntp server 172.16.22.44 version 2 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
To disable the interface from sending NTP broadcast packets, use the no ntp broadcast interface configuration command. This example shows how to configure a port to send NTP Version 2 packets: Switch(config)# interface gigabitethernet0/1 Switch(config-if)# ntp broadcast version 2 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
You can control NTP access on two levels as described in these sections: Creating an Access Group and Assigning a Basic IP Access List, page 5-9 • Disabling NTP Services on a Specific Interface, page 5-10 • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 106
If the source IP address matches the access lists for more than one access type, the first type is granted. If no access groups are specified, all access types are granted to all devices. If any access groups are specified, only the specified access types are granted. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Specify the interface type and number from which the IP source address is taken. By default, the source address is set by the outgoing interface. Step 3 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-10 78-17058-01...
[detail] show ntp status • For detailed information about the fields in these displays, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. Configuring Time and Date Manually If no other source of time is available, you can manually configure the time and date after the system is restarted.
Atlantic Canada (AST) is UTC-3.5, where the 3 means 3 hours and .5 means 50 percent. In this case, the necessary command is clock timezone AST -3 30. To set the time to UTC, use the no clock timezone global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-12 78-17058-01...
This example shows how to specify that summer time starts on the first Sunday in April at 02:00 and ends on the last Sunday in October at 02:00: Switch(config)# clock summer-time PDT recurring 1 Sunday April 2:00 last Sunday October 2:00 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-13 78-17058-01...
A greater-than symbol [>] is appended. The prompt is updated whenever the system name changes. For complete syntax and usage information for the commands used in this section, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2 and the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2.
Domain names are pieced together with periods (.) as the delimiting characters. For example, Cisco Systems is a commercial organization that IP identifies by a com domain name, so its domain name is cisco.com. A specific device in this domain, for example, the File Transfer Protocol (FTP) system is identified as ftp.cisco.com.
Unix> telnet 172.2.5.4 Trying 172.2.5.4... Connected to 172.2.5.4. Escape character is '^]'. This is a secure site. Only authorized users are allowed. For access, contact technical support. User Access Verification Password: Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-18 78-17058-01...
(static or dynamic). For complete syntax and usage information for the commands used in this section, see the command Note reference for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-19 78-17058-01...
VLANs. When you configure a static MAC address in a private VLAN primary or secondary VLAN, you should also configure the same static MAC address in all associated VLANs. For more information about private VLANs, see Chapter 12, “Configuring Private VLANs.” Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-20 78-17058-01...
VLAN as the receiving port. This unnecessary flooding can impact performance. Setting too long an aging time can cause the address table to be filled with unused addresses, which prevents new addresses from being learned. Flooding results, which can impact switch performance. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-21 78-17058-01...
MAC address activity for each hardware port for which the trap is enabled. MAC address notifications are generated for dynamic and secure MAC addresses; events are not generated for self addresses, multicast addresses, or other static addresses. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-22 78-17058-01...
Page 120
Enable the MAC notification trap whenever a • MAC address is added on this interface. Enable the MAC notification trap whenever a • MAC address is removed from this interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-23 78-17058-01...
MAC address in all associated VLANs. Static MAC addresses configured in a private-VLAN primary or secondary VLAN are not replicated in the associated VLAN. For more information about private VLANs, see Chapter 12, “Configuring Private VLANs.” Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-24 78-17058-01...
% Only unicast addresses can be configured to be dropped % CPU destined address cannot be configured as drop address Packets that are forwarded to the CPU are also not supported. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-25 78-17058-01...
MAC address learning be sure that you are familiar with the network topology and the switch system configuration. Disabling MAC address learning on a VLAN could cause flooding in the network. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-26...
Page 124
200 You can display the MAC address learning status of all VLANs or a specified VLAN by entering the show mac-address-table learning [vlan vlan-id] privileged EXEC command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 5-27 78-17058-01...
(represented by the arpa keyword) is enabled on the IP interface. ARP entries added manually to the table do not age and must be manually removed. For CLI procedures, see the Cisco IOS Release 12.2 documentation on Cisco.com. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide...
Configuring SDM Templates This chapter describes how to configure the Switch Database Management (SDM) templates on the Cisco ME 3400 Ethernet Access switch. SDM template configuration is supported only when the switch is running the metro IP access image. For complete syntax and usage information for the commands used in this chapter, see the command Note reference for this release.
Follow these guidelines when selecting and configuring SDM templates: • You must reload the switch for the configuration to take effect. • If you are using the switch for Layer 2 features only, select the layer-2 template. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
IPv4/MAC qos aces: number of IPv4/MAC security aces: On next reload, template will be "layer-2" template. To return to the default template, use the no sdm prefer global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
IPv4 IGMP groups: number of IPv4 multicast routes: number of unicast IPv4 routes: number of IPv4 policy based routing aces: number of IPv4/MAC qos aces: number of IPv4/MAC security aces: Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
C H A P T E R Configuring Switch-Based Authentication This chapter describes how to configure switch-based authentication on the Cisco ME 3400 switch. This chapter consists of these sections: • Preventing Unauthorized Access to Your Switch, page 7-1 Protecting Access to Privileged EXEC Commands, page 7-2 •...
Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS Security Command Reference, Release 12.2. These sections contain this configuration information: •...
This example shows how to change the enable password to l1u2c3k4y5. The password is not encrypted and provides access to level 15 (traditional privileged EXEC mode access): Switch(config)# enable password l1u2c3k4y5 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Encryption prevents the password from being readable in the configuration file. Step 4 Return to privileged EXEC mode. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Disable password recovery. This setting is saved in an area of the flash memory that is accessible by the boot loader and the Cisco IOS image, but it is not part of the file system and is not accessible by any user.
(Optional) Save your entries in the configuration file. To remove the password, use the no password global configuration command. This example shows how to set the Telnet password to let45me67in89: Switch(config)# line vty 10 Switch(config-line)# password let45me67in89 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
To disable username authentication for a specific user, use the no username name global configuration command. To disable password checking and allow connections without a password, use the no login line configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Protecting Access to Privileged EXEC Commands Configuring Multiple Privilege Levels By default, the Cisco IOS software has two modes of password security: user EXEC and privileged EXEC. You can configure up to 16 hierarchical levels of commands for each mode. By configuring multiple passwords, you can allow different sets of users to have access to specified commands.
You might specify a high level or privilege level for your console line to restrict line usage. To return to the default line privilege level, use the no privilege level line configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
(AAA) and can be enabled only through AAA commands. Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS Security Command Reference, Release 12.2. These sections contain this configuration information: •...
Page 140
TACACS+ daemon are encrypted. You need a system running the TACACS+ daemon software to use TACACS+ on your switch. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-11 78-17058-01...
• Telnet, Secure Shell (SSH), rlogin, or privileged EXEC services • Connection parameters, including the host or client IP address, access list, and user timeouts Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-12 78-17058-01...
You can group servers to select a subset of the configured server hosts and use them for a particular service. The server group is used with a global server-host list and contains the list of IP addresses of the selected server hosts. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-13 78-17058-01...
You can designate one or more security protocols to be used for authentication, thus ensuring a backup system for authentication in case the initial method fails. The software uses the first method listed to Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-14...
Page 144
• Step 4 line [console | tty | vty] line-number Enter line configuration mode, and configure the lines to which you want [ending-line-number] to apply the authentication list. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-15 78-17058-01...
Configure the switch for user TACACS+ authorization if the user has privileged EXEC access. The exec keyword might return user profile information (such as autocommand information). Step 4 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-16 78-17058-01...
(AV) pairs and is stored on the security server. This data can then be analyzed for network management, client billing, or auditing. Beginning in privileged EXEC mode, follow these steps to enable TACACS+ accounting for each Cisco IOS privilege level and for network services:...
RADIUS is facilitated through AAA and can be enabled only through AAA commands. Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS Security Command Reference, Release 12.2. These sections contain this configuration information: •...
• Switch-to-switch or router-to-router situations. RADIUS does not provide two-way authentication. RADIUS can be used to authenticate from one device to a non-Cisco device if the non-Cisco device requires authentication. Networks using a variety of services. RADIUS generally binds a user to one service model.
Identifying the RADIUS Server Host Switch-to-RADIUS-server communication involves several components: • Hostname or IP address Authentication destination port • Accounting destination port • Key string • • Timeout period Retransmission value • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-20 78-17058-01...
Page 150
Beginning in privileged EXEC mode, follow these steps to configure per-server RADIUS server communication. This procedure is required. Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 aaa new-model Enable AAA authentication. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-21 78-17058-01...
Page 151
RADIUS host. Step 4 Return to privileged EXEC mode. Step 5 show running-config Verify your entries. Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-22 78-17058-01...
If authentication fails at any point in this cycle—meaning that the security server or local username database responds by denying the user access—the authentication process stops, and no other authentication methods are attempted. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-23 78-17058-01...
Page 153
– Step 4 line [console | tty | vty] line-number Enter line configuration mode, and configure the lines to which you want [ending-line-number] to apply the authentication list. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-24 78-17058-01...
You use the server group server configuration command to associate a particular server with a defined group server. You can either identify the server by its IP address or identify multiple host instances or entries by using the optional auth-port and acct-port keywords. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-25 78-17058-01...
Page 155
Repeat this step for each RADIUS server in the AAA server group. Each server in the group must be previously defined in Step 2. Step 6 Return to privileged EXEC mode. Step 7 show running-config Verify your entries. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-26 78-17058-01...
Use the local database if authentication was not performed by using RADIUS. • Authorization is bypassed for authenticated users who log in through the CLI even if authorization has Note been configured. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-27 78-17058-01...
(AV) pairs and is stored on the security server. This data can then be analyzed for network management, client billing, or auditing. Beginning in privileged EXEC mode, follow these steps to enable RADIUS accounting for each Cisco IOS privilege level and for network services:...
1, which is named cisco-avpair. The value is a string with this format: protocol : attribute sep value * Protocol is a value of the Cisco protocol attribute for a particular type of authorization. Attribute and value are an appropriate attribute-value (AV) pair defined in the Cisco TACACS+ specification, and sep is = for mandatory attributes and is * for optional attributes.
Page 159
Chapter 7 Configuring Switch-Based Authentication Controlling Switch Access with RADIUS For example, this AV pair activates Cisco’s multiple named ip address pools feature during IP authorization (during PPP IPCP address assignment): cisco-avpair= ”ip:addr-pool=first“ This example shows how to provide a user logging in from a switch with immediate access to privileged EXEC commands: cisco-avpair= ”shell:priv-lvl=15“...
Although an IETF draft standard for RADIUS specifies a method for communicating vendor-proprietary information between the switch and the RADIUS server, some vendors have extended the RADIUS attribute set in a unique way. Cisco IOS software supports a subset of vendor-proprietary RADIUS attributes.
Note A Kerberos server can be a Cisco ME switch that is configured as a network security server and that can authenticate users by using the Kerberos protocol. The Kerberos credential scheme uses a process called single logon. This process authenticates a user once and then allows secure authentication (without encrypting another password) wherever that user credential is accepted.
Page 162
A daemon that is running on a network host. Users and network services register their identity with the Kerberos server. Network services query the Kerberos server to authenticate to other network services. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-33 78-17058-01...
4. SRVTAB = server table Kerberos Operation A Kerberos server can be a Cisco ME switch that is configured as a network security server and that can authenticate remote users by using the Kerberos protocol. Although you can customize Kerberos in a number of ways, remote users attempting to access network services must pass through three layers of security before they can access network services.
KDC and obtain a TGT from the KDC to access network services. For instructions about how to authenticate to a KDC, see the “Obtaining a TGT from a KDC” section in the “Security Server Protocols” chapter of the Cisco IOS Security Configuration Guide, Release 12.2, at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fsecsp/scfkerb.ht...
The Kerberos realm name must be in all uppercase characters. Note A Kerberos server can be a Cisco ME switch that is configured as a network security server and that can authenticate users by using the Kerberos protocol. To set up a Kerberos-authenticated server-client system, follow these steps: •...
For complete syntax and usage information for the commands used in this section, see the command Note reference for this release and the command reference for Cisco IOS Release 12.2 at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/index.htm. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide...
You can use an SSH client to connect to a switch running the SSH server. The SSH server works with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client also works with the SSH server supported in this release and with non-Cisco SSH servers.
Setting Up the Switch to Run SSH Follow these steps to set up your switch to run SSH: Download the cryptographic software image from Cisco.com. This step is required. For more information, see the release notes for this release. Configure a hostname and IP domain name for the switch. Follow this procedure only if you are configuring the switch as an SSH server.
Specify the number of times that a client can re-authenticate to the • server. The default is 3; the range is 0 to 5. Repeat this step when configuring both parameters. Step 4 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-40 78-17058-01...
Shows the status of the SSH server. For more information about these commands, see the “Secure Shell Commands” section in the “Other Security Features” chapter of the Cisco IOS Security Command Reference, Cisco IOS Release 12.2, at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_r/fothercr/ srfssh.htm.
Page 171
Chapter 7 Configuring Switch-Based Authentication Configuring the Switch for Secure Shell Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 7-42 78-17058-01...
Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication on the Cisco ME 3400 Ethernet Access switch. As LANs extend to hotels, airports, and corporate lobbies and create insecure environments, 802.1x prevents unauthorized devices (clients) from gaining access to the network.
Authentication Protocol (EAP) extensions is the only supported authentication server. It is available in Cisco Secure Access Control Server Version 3.0 or later. RADIUS operates in a client/server model in which secure authentication information is exchanged between the RADIUS server and one or more RADIUS clients.
The specific exchange of EAP frames depends on the authentication method being used. Figure 8-2 shows a message exchange initiated by the client using the One-Time-Password (OTP) authentication method with a RADIUS server. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server. Each client attempting to access the network is uniquely identified by the switch by using the client MAC address. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
AV pairs that might be sent by the switch: Table 8-1 Accounting AV Pairs Attribute number AV pair name Attribute[1] User-Name Attribute[4] NAS-IP-Address Attribute[5] NAS-Port Attribute[6] NAS-Port-Type Attribute[8] Framed-IP-Address Attribute[25] Class Attribute[30] Called-Station-ID Attribute[31] Calling-Station-ID Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
You can view the AV pairs that are being sent by the switch by enabling the debug radius accounting or debug aaa accounting privileged EXEC commands. For more information about these commands, see the Cisco IOS Debug Command Reference, Release 12.2 at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122sup/122debug/ See RFC 3580, “IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines,”...
If the port is administratively shut down, the port becomes unauthenticated, and all dynamic entries • are removed from the secure host table. For more information about enabling port security on your switch, see the “Configuring Port Security” section on page 21-8. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
6). Attribute[81] specifies the VLAN name or VLAN ID assigned to the IEEE 802.1x-authenticated user. For examples of tunnel attributes, see the “Configuring the Switch to Use Vendor-Specific RADIUS Attributes” section on page 7-29. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Number of seconds between 3600 seconds. re-authentication attempts Re-authentication number 2 times (number of times that the switch restarts the authentication process before the port changes to the unauthorized state). Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
You can configure any VLAN except an RSPAN VLAN or a private VLAN. • The IEEE 802.1x with VLAN assignment feature is not supported on private-VLAN ports, trunk ports, or ports with dynamic-access port assignment through a VMPS. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-10 78-17058-01...
Though other keywords are visible in the command-line help Note string, only the group radius keywords are supported. Step 4 dot1x system-auth-control Enable IEEE 802.1x authentication globally on the switch. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-11 78-17058-01...
This key must match the encryption used on the RADIUS daemon. If you want to use multiple RADIUS servers, re-enter this command. Step 3 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-12 78-17058-01...
To disable periodic re-authentication, use the no dot1x reauthentication interface configuration command. To return to the default number of seconds between re-authentication attempts, use the no dot1x timeout reauth-period interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-13 78-17058-01...
To return to the default quiet time, use the no dot1x timeout quiet-period interface configuration command. This example shows how to set the quiet time on the switch to 30 seconds: Switch(config-if)# dot1x timeout quiet-period 30 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-14 78-17058-01...
This procedure is optional. Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 interface interface-id Specify the port to be configured, and enter interface configuration mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-15 78-17058-01...
This example shows how to set 4 as the number of times that the switch restarts the authentication process before the port changes to the unauthorized state: Switch(config-if)# dot1x max-reauth-req 4 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-16 78-17058-01...
Step 4 Return to privileged EXEC mode. Step 5 show dot1x interface interface-id Verify your entries. Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-17 78-17058-01...
EXEC command. To display the IEEE 802.1x administrative and operational status for a specific port, use the show dot1x interface interface-id privileged EXEC command. For detailed information about the fields in these displays, see the command reference for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-19 78-17058-01...
Page 191
Chapter 8 Configuring IEEE 802.1x Port-Based Authentication Displaying IEEE 802.1x Statistics and Status Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 8-20 78-17058-01...
C H A P T E R Configuring Interface Characteristics This chapter defines the types of interfaces on the Cisco ME 3400 Ethernet Access switch and describes how to configure them. The chapter consists of these sections: • Understanding Interface Types, page 9-1 Using Interface Configuration Mode, page 9-7 •...
VLAN or when a user creates a VLAN. To isolate VLANs of different customers in a service-provider network, the Cisco ME switch uses UNI VLANs. UNI VLANs isolate user network interfaces (UNIs) on the switch from UNIs that belong to other customer VLANs: •...
User-network interfaces (UNIs) and network node interfaces (NNIs) are supported on the Cisco ME switch. UNIs are typically connected to a host, such as a PC or a Cisco IP phone. NNIs are typically connected to a router or to another switch. By default, the 10/100 ports on the Cisco ME switch are configured as UNIs, and the SFP module uplink ports are configured as NNIs.
Dynamic access ports on the switch are assigned to a VLAN by a VLAN Membership Policy Server (VMPS). The VMPS can be a Catalyst 6500 series switch; the Cisco ME switch cannot be a VMPS server. Dynamic access ports for VMPS are only supported on UNIs.
Chapter 32, “Configuring IP Unicast Routing,” Chapter 34, “Configuring IP Multicast Routing.” Routed ports (or SVIs) are supported only when the metro IP access image is installed on the switch. Note Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Most protocols operate over either single ports or aggregated switch ports and do not recognize the physical ports within the port group. Exceptions are the Cisco Discovery Protocol (CDP), Link Aggregation Control Protocol (LACP), and the Port Aggregation Protocol (PAgP), which operate only on physical NNI ports.
Type—Fast Ethernet (fastethernet or fa) for 10/100 Mbps Ethernet, Gigabit Ethernet (gigabitethernet or gi) for 10/100/1000 Mbps Ethernet ports, or small form-factor pluggable (SFP) module Gigabit Ethernet interfaces. Module number—The module or slot number on the switch (always 0 on the Cisco ME switch). • •...
Step 4 You can now use the normal configuration commands to apply the configuration parameters to all interfaces in the range. Step 5 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Page 200
If you exit interface range configuration mode while the commands are being executed, some commands might not be executed on all interfaces in the range. Wait until the command prompt reappears before exiting interface range configuration mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
The VLAN interfaces must have been configured with the interface vlan command. The show running-config privileged EXEC command displays the configured VLAN interfaces. VLAN interfaces not displayed by the show running-config command cannot be used as interface-ranges. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 9-10 78-17058-01...
“Default Port Security Configuration” section on page 21-10. Port Fast Disabled. See the “Default Optional Spanning-Tree Configuration” section on page 16-5. Auto-MDIX Enabled. Cisco Discovery Protocol (CDP) Enabled. VMPS Not configured. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 9-12 78-17058-01...
Enabled. Configuring User Network and Network Node Interfaces By default, all the 10/100 ports on the Cisco ME switch are configured as UNIs, and the SFP module ports are configured as NNIs. You can use the port-type interface configuration command to change the port types. At any one time, only four ports on the switch can be configured as NNIs, but every port on the switch can be configured as UNIs.
These sections describe how to configure the interface speed and duplex mode: • Speed and Duplex Configuration Guidelines, page 9-15 • Setting the Interface Speed and Duplex Parameters, page 9-15 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 9-14 78-17058-01...
When STP is enabled and a port is reconfigured, the switch can take up to 30 seconds to check for • loops. The port LED is amber while STP reconfigures. On the Cisco ME switch, STP is supported only on NNIs.
Page 207
This command is not available on SFP module ports with these exceptions: • If a Cisco 1000BASE-T SFP module is inserted, you can configure duplex to auto or to full. • If a Cisco 100BASE-FX SFP module is inserted, you can configure duplex to full or to half.
To disable IEEE 802.3x flow control, use the flowcontrol receive off interface configuration command. This example shows how to enable IEEE 802.3x flow control on a port: Switch# configure terminal Switch(config)# interface gigabitethernet0/1 Switch(config-if)# flowcontrol receive on Switch(config-if)# end Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 9-17 78-17058-01...
Auto-MDIX is supported on all 10/100 and 10/100/1000 Mbps interfaces and on Cisco 10/100/1000 BASE-T/TX SFP module interfaces. It is not supported on 1000 BASE-SX or -LX SFP module interfaces.
End with CNTL/Z. Switch(config)# interface gigabitethernet0/2 Switch(config-if)# description Connects to Marketing Switch(config-if)# end Switch# show interfaces gigabitethernet0/2 description Interface Status Protocol Description Gi 0/2 admin down down Connects to Marketing Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 9-19 78-17058-01...
Configuring Interface Characteristics Configuring Layer 3 Interfaces Configuring Layer 3 Interfaces The Cisco 3400 ME switch must be running the metro IP access image to support Layer 3 interfaces. The Cisco ME switch supports these types of Layer 3 interfaces: •...
(OSPF) protocol uses this MTU value before setting up an adjacency with a peer router. To view the MTU value for routed packets for a specific VLAN, use the show platform port-asic mvid privileged EXEC command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 9-21 78-17058-01...
(You can display the full list of show commands by using the show ? command at the privileged EXEC prompt.) These commands are fully described in the Cisco IOS Interface Command Reference, Release 12.2. Table 9-4...
Use the no shutdown interface configuration command to restart the interface. To verify that an interface is disabled, enter the show interfaces privileged EXEC command. A disabled interface is shown as administratively down in the display. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 9-24 78-17058-01...
C H A P T E R Configuring Command Macros This chapter describes how to configure and apply command macros on the Cisco 3400 ME switch. For complete syntax and usage information for the commands used in this chapter, see the command Note reference for this release.
If a command fails because of a syntax error or a configuration error, the macro continues to apply the remaining commands. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 10-2 78-17058-01...
MAC addresses and also includes two help string keywords by using # macro keywords: Switch(config)# macro name test switchport access vlan $VLANID switchport port-security maximum $MAX #macro keywords $VLANID $MAX Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 10-3 78-17058-01...
Step 10 show parser macro description Verify that the macro is applied to the interface. [interface interface-id] Step 11 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 10-4 78-17058-01...
Displays a specific macro. show parser macro brief Displays the configured macro names. show parser macro description [interface Displays the macro description for all interfaces or for a specified interface-id] interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 10-5 78-17058-01...
This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information about VLAN membership modes, VLAN configuration modes, VLAN trunks, and dynamic VLAN assignment from a VLAN Membership Policy Server (VMPS).
Page 223
This section includes these topics: • Supported VLANs, page 11-3 • Normal-Range VLANs, page 11-3 • Extended-Range VLANs, page 11-4 VLAN Port Membership Modes, page 11-4 • UNI VLANs, page 11-5 • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-2 78-17058-01...
Ring VLANs and view the results in the vlan.dat file, but these parameters are not used. • VLAN state (active or suspended) • Maximum transmission unit (MTU) for the VLAN • Security Association Identifier (SAID) • Bridge identification number for TrBRF VLANs Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-3 78-17058-01...
For information about configuring trunk ports, see the “Configuring an Ethernet Interface as a Trunk Port” section on page 11-16. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-4 78-17058-01...
A dynamic-access port can belong to one VLAN (VLAN ID 1 to 4094) and is dynamically assigned by a VMPS. The VMPS can be a Catalyst 5000 or Catalyst 6500 series switch, for example, but never a Cisco ME 3400 Ethernet Access switch. The Cisco ME 3400 switch is a VMPS client.
Fast Ethernet ports 6-10. The NNIs in both VLAN 10 and VLAN 20 can exchange packets with the UNIs in the same VLAN. Figure 11-2 UNI Isolated and Community VLANs in the Cisco ME Switch To service-provider network Gigabit Ether...
Private VLANs none configured 2 to 1001, 1006 to 4094. UNI VLAN UNI isolated VLAN 2 to 1001, 1006 to 4094. VLAN 1 is always a UNI isolated VLAN. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-7 78-17058-01...
SVIs, and other configured features affects the use of the switch hardware. If you try to create an extended-range VLAN and there are not enough hardware resources available, an error message is generated, and the extended-range VLAN is rejected. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-8 78-17058-01...
{name vlan-name | id vlan-id} Verify your entries. The name option is only valid for VLAN IDs 1 to 1005. Step 7 copy running-config startup config (Optional) Save the configuration in the switch startup configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-9 78-17058-01...
Verify your entries in the Administrative Mode and the Access Mode VLAN fields of the display. Step 9 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-10 78-17058-01...
Re-enable the routed port. It will be assigned a new internal VLAN ID. Step 10 Return to privileged EXEC mode. Step 11 copy running-config startup config (Optional) Save your entries in the switch startup configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-11 78-17058-01...
If you attempt to add a UNI static access port to a UNI community VLAN that already has eight UNIs, the configuration is refused. If a UNI dynamic access port is added to a UNI community VLAN that already has eight UNIs, the port is error-disabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-12 78-17058-01...
The show vlan and show vlan vlan-id privileged EXEC commands also display UNI VLAN information, but only UNI community VLANs appear. To display both isolated and community VLANs, use the show vlan uni-vlan type command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-13 78-17058-01...
11-4). You can set an interface as trunking or nontrunking. If you do not intend to trunk across links, use the switchport mode access interface configuration • command to disable trunking. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-14 78-17058-01...
VLAN allowed on the trunks. Non-Cisco devices might support one spanning-tree instance for all VLANs. When you connect a Cisco switch to a non-Cisco device through an IEEE 802.1Q trunk, the Cisco switch combines the spanning-tree instance of the VLAN of the trunk with the spanning-tree instance of the non-Cisco IEEE 802.1Q switch.
If you try to enable IEEE 802.1x on a trunk port, an error message appears, and IEEE 802.1x is not enabled. If you try to change the mode of an IEEE 802.1x-enabled port to trunk, the port mode is not changed. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-16 78-17058-01...
VLANs from passing over the trunk. To restrict the traffic a trunk carries, use the switchport trunk allowed vlan remove vlan-list interface configuration command to remove specific VLANs from the allowed list. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-17 78-17058-01...
Page 239
Configuring VLAN Trunks Note VLAN 1 is the default VLAN on all trunk ports in all Cisco switches, and it has previously been a requirement that VLAN 1 always be enabled on every trunk link. The VLAN 1 minimization feature allows you to disable VLAN 1 on any individual VLAN trunk link so that no user traffic (including spanning-tree advertisements) is sent or received on VLAN 1.
STP path costs, each load-sharing link can be connected to the same switch or to two different switches. For more information about STP, see Chapter 14, “Configuring STP.” Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-19 78-17058-01...
Assign the port priority of 16 for VLANs 8 through 10 on Trunk 1. Step 14 Return to privileged EXEC mode. Step 15 show interfaces gigabitethernet 0/1 Verify the port configuration. switchport Step 16 configure terminal Enter global configuration mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-20 78-17058-01...
Page 243
Follow the same steps on Switch B to configure the trunk port for Trunk 1 with a path cost of 30 for VLANs 2 through 4, and configure the trunk port for Trunk 2 with a path cost of 30 for VLANs 8 through Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-22...
If the VLAN in the database does not match the current VLAN on the port and active hosts exist on • the port, the VMPS sends an access-denied or a port-shutdown response, depending on the secure mode of the VMPS. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-23 78-17058-01...
You must have IP connectivity to the VMPS for dynamic-access ports to work. You can test for IP connectivity by pinging the IP address of the VMPS and verifying that you get a response. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-25...
VMPS domain server—the IP address of the configured VLAN membership policy servers. The • switch sends queries to the one marked current. The one marked primary is the primary server. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-27 78-17058-01...
End stations are connected to the clients, Switch B and Switch I. • The database configuration file is stored on the TFTP server with the IP address 172.20.22.7. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-28 78-17058-01...
Page 250
172.20.26.155 Switch F 172.20.26.156 Switch G 172.20.26.157 Switch H Client switch I Dynamic-access port 172.20.26.158 station 2 Trunk port 172.20.26.159 Catalyst 6500 series Secondary VMPS Switch J Server 3 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 11-29 78-17058-01...
C H A P T E R Configuring Private VLANs This chapter describes how to configure private VLANs on the Cisco ME 3400 Ethernet Access switch. For complete syntax and usage information for the commands used in this chapter, see the command Note reference for this release.
VLANs associated with the primary VLAN. Note Promiscuous ports must be network node interfaces (NNIs). UNIs cannot be configured as promiscuous ports. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-2 78-17058-01...
Page 254
VLANs to other devices that support private VLANs. To maintain the security of your private-VLAN configuration and to avoid other use of the VLANs configured as private VLANs, configure private VLANs on all intermediate devices, including devices that have no private-VLAN ports. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-3 78-17058-01...
VLAN association in some switches in the network, the Layer 2 databases in these switches are not merged. This can result in unnecessary flooding of private-VLAN traffic on those switches. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-4 78-17058-01...
Guidelines for configuring private VLANs fall into these categories: Secondary and Primary VLAN Configuration, page 12-7 • Private-VLAN Port Configuration, page 12-8 • Limitations with Other Features, page 12-9 • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-6 78-17058-01...
You can configure VLAN maps on primary and secondary VLANs (see the “Configuring VLAN Maps” section on page 28-29). However, we recommend that you configure the same VLAN maps on private-VLAN primary and secondary VLANs. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-7 78-17058-01...
UNIs, the configuration is not allowed. If you try to configure a VLAN that includes more than eight UNIs as a community private VLAN, the configuration is not allowed. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-8 78-17058-01...
VLAN. When the original dynamic MAC address is deleted or aged out, the replicated addresses are removed from the MAC address table. Configure Layer 3 VLAN interfaces (SVIs) only for primary VLANs. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-9 78-17058-01...
Return to privileged EXEC mode. Step 14 show vlan private-vlan [type] Verify the configuration. show interfaces status Step 15 copy running-config startup config (Optional) Save your entries in the switch startup configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-10 78-17058-01...
Page 262
Switch(config-vlan)# private-vlan community Switch(config-vlan)# exit Switch(config)# vlan 20 Switch(config-vlan)# private-vlan association 501-503 Switch(config-vlan)# end Switch(config)# show vlan private vlan Primary Secondary Type Ports ------- --------- ----------------- ------------------------------------------ isolated community community non-operational Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-11 78-17058-01...
Switch(config-if)# switchport private-vlan mapping 20 add 501-503 Switch(config-if)# end Use the show vlan private-vlan or the show interface status privileged EXEC command to display primary and secondary VLANs and private-VLAN ports on the switch. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-13 78-17058-01...
This is an example of the output from the show vlan private-vlan command: Switch(config)# show vlan private-vlan Primary Secondary Type Ports ------- --------- ----------------- ------------------------------------------ isolated Fa0/1, Gi0/1, Gi0/2 community Fa0/11, Fa0/12, Gi0/1 non-operational Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 12-15 78-17058-01...
VLAN and Layer 2 protocol configurations of each customer without impacting the traffic of other customers. The Cisco ME 3400 Ethernet Access switch supports IEEE 802.1Q tunneling and Layer 2 protocol tunneling when it is running the metro access or metro IP access image.
Page 269
When the packet exits another trunk port on the same core switch, the same metro tag is again added to the packet. Figure 13-2 shows the tag structures of the double-tagged packets. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-2 78-17058-01...
Page 270
The priority field on the metro tag is set to the interface class of service (CoS) priority configured on the tunnel port. (The default is zero if none is configured.) Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-3...
The packet carries only the VLAN 30 tag through the service-provider network to the trunk port of the egress-edge switch (Switch C) and is misdirected through the egress switch tunnel port to Customer Y. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-4 78-17058-01...
Use ISL trunks between core switches in the service-provider network. Although customer interfaces connected to edge switches must be IEEE 802.1Q trunks, we recommend using ISL trunks for connecting switches in the core layer. The Cisco ME switch does not support ISL trunks. •...
When an NNI port is configured as an IEEE 802.1Q tunnel port, spanning-tree bridge protocol data unit (BPDU) filtering is automatically enabled on the interface, and Cisco Discovery Protocol (CDP) is automatically disabled on the interface. UNIs do not support BPDU filtering or CDP.
Page 274
Switch(config)# vlan dot1q tag native Switch(config)# end Switch# show dot1q-tunnel interface gigabitethernet0/2 dot1q-tunnel mode LAN Port(s) ----------------------------- Gi0/1 Switch# show vlan dot1q tag native dot1q native vlan tagging is enabled Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-7 78-17058-01...
Cisco devices from local and remote sites. VLAN Trunking Protocol (VTP) must provide consistent VLAN configuration throughout all sites in the customer network that are participating in VTP. The Cisco ME 3400 switch does not support VTP; CDP and STP are supported only on NNIs. However, Note Layer 2 protocol tunneling is supported on all ports on the switch.
Page 276
When you enable protocol tunneling (PAgP or LACP) on the SP switch, remote customer switches receive the PDUs and can negotiate the automatic creation of EtherChannels. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-9 78-17058-01...
When the Layer 2 PDUs that entered the service-provider inbound edge switch through a Layer 2 protocol-enabled port exit through the trunk port into the service-provider network, the switch overwrites the customer PDU-destination MAC address with a well-known Cisco proprietary multicast address (01-00-0c-cd-cd-d0). If IEEE 802.1Q tunneling is enabled, packets are also double-tagged; the outer tag is the customer metro tag, and the inner tag is the customer’s VLAN tag.
If you also enable Layer 2 protocol tunneling on the egress trunk port, this behavior is bypassed, and the switch forwards control PDUs without any processing or modification. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-11 78-17058-01...
Enable the port, if necessary. By default, UNIs are disabled, and NNIs are enabled. Step 4 switchport mode access Configure the interface as an access port or an IEEE 802.1Q tunnel port. The default switchport mode is access. switchport mode dot1q-tunnel Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-12 78-17058-01...
Note If you also set a drop threshold on this interface, the shutdown-threshold value must be greater than or equal to the drop-threshold value. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-14 78-17058-01...
Enable the port, if necessary. By default, UNIs are disabled and NNIs are enabled. Step 4 switchport mode trunk Enable trunking on the interface. Step 5 udld enable Enable UDLD in normal mode on the interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-15 78-17058-01...
Display only Layer 2 protocol summary information. show vlan dot1q tag native Display the status of native VLAN tagging on the switch. For detailed information about these displays, see the command reference for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 13-18 78-17058-01...
Cisco ME 3400 Ethernet Access switch. The switch uses the per-VLAN spanning-tree plus (PVST+) protocol based on the IEEE 802.1D standard and Cisco proprietary extensions, or it can use the rapid per-VLAN spanning-tree plus (rapid-PVST+) protocol based on the IEEE 802.1w standard. On the Cisco ME switch, STP is supported only on network node interfaces (NNIs).
On the Cisco ME 3400 switch, only NNIs participate in STP. Active UNIs are always in the forwarding Note state. In this overview, STP ports can be any interfaces on other switches, but only NNIs on a Cisco ME switch.
Table 14-1 on page 14-4. A root port is selected for each switch (except the root switch). On the Cisco ME switch, this port • is always an NNI. This port provides the best path (lowest cost) when the switch forwards packets to the root switch.
A designated switch for each LAN segment is selected. The designated switch incurs the lowest path cost when forwarding packets from that LAN to the root switch. The port through which the designated switch is attached to the LAN is called the designated port. For the Cisco ME switch, this only applies to NNIs.
Page 290
Chapter 14 Configuring STP Understanding Spanning-Tree Features Each Layer 2 interface on a switch using spanning tree (or on a Cisco ME switch, each Layer 2 NNI) exists in one of these states: • Blocking—The interface does not participate in frame forwarding.
An interface in the learning state performs these functions: • Discards frames received on the interface Discards frames switched from another interface for forwarding • Learns addresses • Receives BPDUs • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-6 78-17058-01...
If spanning tree is enabled, the CPU on the switch receives packets destined for 0x0180C2000000 and 0x0180C2000010. If spanning tree is disabled, the switch forwards those packets as unknown multicast addresses. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-8 78-17058-01...
IEEE 802.1w standard. This is the default spanning-tree mode for the Cisco ME switch NNIs. Rapid PVST+ is compatible with PVST+. To provide rapid convergence, the rapid PVST+ immediately deletes dynamically learned MAC address entries on a per-port basis upon receiving a topology change.
VLAN allowed on the trunks. When you connect a Cisco switch to a non-Cisco device through an IEEE 802.1Q trunk, the Cisco switch uses PVST+ to provide spanning-tree interoperability. If rapid PVST+ is enabled, the switch uses it instead of PVST+.
(For example, all VLANs run PVST+, all VLANs run rapid PVST+, or all VLANs run MSTP.) For information about the different spanning-tree modes and how they interoperate, see the “Spanning-Tree Interoperability and Backward Compatibility” section on page 14-10. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-12 78-17058-01...
This step is optional if the designated switch detects that this switch is running rapid PVST+. Step 7 show spanning-tree summary Verify your entries. show spanning-tree interface interface-id Step 8 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-13 78-17058-01...
4-bit switch priority value as shown in Table 14-1 on page 14-4.) The spanning-tree vlan vlan-id root global configuration command fails if the value necessary to be the Note root switch is less than 1. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-14 78-17058-01...
Page 300
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no spanning-tree vlan vlan-id root global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-15 78-17058-01...
(higher numerical values) to ones that you want selected last. If all NNIs have the same priority value, spanning tree puts the NNI with the lowest interface number in the forwarding state and blocks the other interfaces. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-16 78-17058-01...
Page 302
For information on how to configure load sharing on trunk ports by using spanning-tree port priorities, see the “Configuring Trunk Ports for Load Sharing” section on page 11-19. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-17 78-17058-01...
The show spanning-tree interface interface-id privileged EXEC command displays information only for ports that are in a link-up operative state. Otherwise, you can use the show running-config privileged EXEC command to confirm the configuration. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-18 78-17058-01...
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no spanning-tree vlan vlan-id priority global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-19 78-17058-01...
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no spanning-tree vlan vlan-id hello-time global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-20 78-17058-01...
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no spanning-tree vlan vlan-id max-age global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-21 78-17058-01...
You can clear spanning-tree counters by using the clear spanning-tree [interface interface-id] privileged EXEC command. For information about other keywords for the show spanning-tree privileged EXEC command, see the command reference for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 14-22 78-17058-01...
This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the Cisco ME 3400 Ethernet Access switch. On the Cisco ME switch, STP is supported only on network node interfaces (NNIs). User network interfaces (UNIs) on the switch do not participate in STP and forward traffic immediately when they are brought up.
BPDUs. Because the MSTP BPDU carries information for all instances, the number of BPDUs that need to be processed by a switch to support multiple spanning-tree instances is significantly reduced. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-2 78-17058-01...
1 (A) is also the CST root. The IST master for region 2 (B) and the IST master for region 3 (C) are the roots for their respective subtrees within the CST. The RSTP runs in all regions. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-3...
(trigger a reconfiguration). The root switch of the instance always sends a BPDU (or M-record) with a cost of 0 and the hop count set to the Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-4...
MST configuration.A boundary port also connects to a LAN, the designated switch of which is either a single spanning-tree switch or a switch with a different MST configuration. On the Cisco ME switch, only NNIs are MST ports. UNIs do not participate in STP. Note...
BPDUs” section on page 14-3. Then the RSTP assigns one of these port roles to individual ports. On the Cisco ME switch, only NNIs are RSTP ports. UNIs do not participate in STP. Note Root port—Provides the best path (lowest cost) when the switch forwards packets to the root switch.
Disabled Disabled Discarding To be consistent with Cisco STP implementations, this guide documents the port state as blocking instead of discarding. Designated ports start in the listening state. Rapid Convergence The RSTP provides for rapid recovery of connectivity following the failure of a switch, a switch port, or a LAN.
It is an edge port (a port configured to be at the edge of the network). If a designated port (NNI on the Cisco ME switch) is in the forwarding state and is not configured as an edge port, it transitions to the blocking state when the RSTP forces it to synchronize with new root information.
The sending switch sets the agreement flag in the RSTP BPDU to accept the previous proposal. The port role in the agreement message is always set to the root port. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-9...
802.1D switch and a configuration BPDU with the TCA bit set is received, the TC-while timer is reset. This behavior is only required to support IEEE 802.1D switches. The RSTP BPDUs never have the TCA bit set. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-10 78-17058-01...
MST cloud. For this to occur, the IST master of the MST cloud should also be the root of the CST. If the MST cloud consists of multiple MST regions, one Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-12...
Specify the configuration revision number. The range is 0 to 65535. Step 6 show pending Verify your configuration by displaying the pending configuration. Step 7 exit Apply all changes, and return to global configuration mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-13 78-17058-01...
ID support, the switch sets its own priority for the specified instance to 24576 if this value will cause this switch to become the root for the specified spanning-tree instance. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-14...
Page 322
(Optional) Save your entries in the configuration file. To return the switch to its default setting, use the no spanning-tree mst instance-id root global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-15 78-17058-01...
(Optional) Save your entries in the configuration file. To return the switch to its default setting, use the no spanning-tree mst instance-id root global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-16 78-17058-01...
Otherwise, you can use the show running-config interface privileged EXEC command to confirm the configuration. To return the interface to its default setting, use the no spanning-tree mst instance-id port-priority interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-17 78-17058-01...
Otherwise, you can use the show running-config privileged EXEC command to confirm the configuration. To return the interface to its default setting, use the no spanning-tree mst instance-id cost interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-18 78-17058-01...
Exercise care when using this command. For most situations, we recommend that you use the Note spanning-tree mst instance-id root primary and the spanning-tree mst instance-id root secondary global configuration commands to modify the hello time. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-19 78-17058-01...
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return the switch to its default setting, use the no spanning-tree mst forward-time global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-20 78-17058-01...
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return the switch to its default setting, use the no spanning-tree mst max-hops global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-21 78-17058-01...
To restart the protocol migration process (force the renegotiation with neighboring switches) on the switch, use the clear spanning-tree detected-protocols privileged EXEC command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-22 78-17058-01...
Displays MST information for the specified interface. For information about other keywords for the show spanning-tree privileged EXEC command, see the command reference for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-23 78-17058-01...
Page 331
Chapter 15 Configuring MSTP Displaying the MST Configuration and Status Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 15-24 78-17058-01...
Multiple Spanning Tree Protocol (MSTP) or the rapid per-VLAN spanning-tree plus (rapid-PVST+) protocol. On the Cisco ME switch, STP is supported only on network node interfaces (NNIs). User network interfaces (UNIs) on the switch do not participate in STP and forward traffic immediately when they are brought up.
At the interface level, you enable BPDU guard on any NNI by using the spanning-tree bpduguard enable interface configuration command without also enabling the Port Fast feature. When the NNI receives a BPDU, it is put in the error-disabled state. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 16-2 78-17058-01...
(blocked) state to prevent the customer’s switch from becoming the root switch or being in the path to the root. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 16-3 78-17058-01...
When the switch is operating in MST mode, BPDUs are not sent on nonboundary ports only if the interface is blocked by loop guard in all MST instances. On a boundary port, loop guard blocks the interface in all MST instances. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 16-4 78-17058-01...
You can enable this feature if your switch is running PVST+, rapid PVST+, or MSTP. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 16-5 78-17058-01...
Use the BPDU guard feature in a service-provider network to prevent an access port from participating in the spanning tree. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 16-6 78-17058-01...
Configure Port Fast only on NNIs that connect to end stations; otherwise, an accidental topology loop Caution could cause a data packet loop and disrupt switch and network operation. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 16-7 78-17058-01...
This feature is most effective when it is configured on the entire switched network. Loop guard operates only on NNIs that are considered point-to-point by the spanning tree. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 16-9 78-17058-01...
You can clear spanning-tree counters by using the clear spanning-tree [interface interface-id] privileged EXEC command. For information about other keywords for the show spanning-tree privileged EXEC command, see the command reference for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 16-10 78-17058-01...
Configuring Flex Links This chapter describes how to configure Flex Links, a pair of interfaces on the Cisco ME 3400 switch that are used to provide a mutual backup. This feature is available only when the switch is running the metro IP access or metro access image.
(EtherChannel logical interfaces) as Flex Links, and you can configure a port channel and a physical interface as Flex Links, with either the port channel or the physical interface as the active link. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 17-2 78-17058-01...
Displays the Flex Link backup interface configured for an interface, or [interface-id] switchport displays all Flex Links configured on the switch and the state of each backup active and backup interface (up or standby mode). Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 17-4 78-17058-01...
This chapter describes how to configure DHCP snooping and the option-82 data insertion features on the Cisco ME 3400 Ethernet Access witch. It also describes how to configure the IP source guard feature, which is supported on switches running the metro access and metro IP access images.
If the DHCP server cannot give the DHCP client the requested configuration parameters from its database, it can forward the request to one or more secondary DHCP servers defined by the network administrator. The Cisco ME switch cannot be a DHCP server. DHCP Relay Agent A DHCP relay agent is a Layer 3 device that forwards DHCP packets between clients and servers.
The DHCP security features, such as dynamic ARP inspection or IP source guard on a Cisco ME 3400 switch running the metro access or metro IP access image, can still be enabled on the aggregation switch while the switch receives packets with option-82 information on ingress untrusted interfaces to which hosts are connected.
Page 349
Length of the circuit ID type • Remote ID suboption fields Suboption type – Length of the suboption type – Remote ID type – Length of the circuit ID type – Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 18-4 78-17058-01...
If the file is not updated in a specified time (set by the write-delay and abort-timeout values), the update stops. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 18-5...
• DHCP server and the DHCP relay agent are configured and enabled. When you globally enable DHCP snooping on the switch, these Cisco IOS commands are not • available until snooping is disabled. If you enter these commands, the switch returns an error message, and the configuration is not applied.
(Optional) Save your entries in the configuration file. To disable the DHCP relay agent, use the no service dhcp global configuration command. See the “Configuring DHCP” section of the “IP Addressing and Services” section of the Cisco IOS IP Configuration Guide, Release 12.2 for these procedures: Checking (validating) the relay agent information •...
Step 12 copy running-config startup-config (Optional) Save your entries in the configuration file. To remove the DHCP packet forwarding address, use the no ip helper-address address interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 18-9 78-17058-01...
The default is to verify that the source MAC address matches the client hardware address in the packet. Step 12 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 18-10 78-17058-01...
200. DHCP Snooping configuration on secondary vlan is derived from its primary vlan. The show ip dhcp snooping privileged EXEC command output shows all VLANs, including primary and secondary private VLANs, on which DHCP snooping is enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 18-11 78-17058-01...
To delete binding entries from the DHCP snooping binding database, use the no ip dhcp snooping binding mac-address vlan vlan-id ip-address interface interface-id privileged EXEC command. Enter this command for each entry that you delete. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 18-12 78-17058-01...
IP source guard with source IP address filtering or with source IP and MAC address filtering. These sections contain this information: Source IP Address Filtering, page 18-14 • Source IP and MAC Address Filtering, page 18-14 • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 18-13 78-17058-01...
Step 4 ip verify source Enable IP source guard with source IP address filtering. ip verify source port-security Enable IP source guard with source IP and MAC address filtering. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 18-15 78-17058-01...
Commands for Displaying IP Source Guard Information Command Purpose show ip source binding Display the IP source bindings on a switch. show ip verify source Display the IP source guard configuration on the switch. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 18-16 78-17058-01...
This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynamic ARP inspection) on the Cisco ME 3400 switch. This feature helps prevent malicious attacks on the switch by not relaying invalid ARP requests and responses to other ports in the same VLAN.
Page 363
“Configuring ARP ACLs for Non-DHCP Environments” section on page 19-8. The switch logs dropped packets. For more information about the log buffer, see the “Logging of Dropped Packets” section on page 19-4. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-2 78-17058-01...
Switch B (and Host 2, if the link between the switches is configured as trusted). This condition can occur even though Switch B is running dynamic ARP inspection. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-3 78-17058-01...
After the message is generated, the switch clears the entry from the log buffer. Each log entry contains flow information, such as the receiving VLAN, the port number, the source and destination IP addresses, and the source and destination MAC addresses. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-4 78-17058-01...
The number of entries in the log is 32. The number of system messages is limited to 5 per second. The logging-rate interval is 1 second. Per-VLAN logging All denied or dropped ARP packets are logged. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-5 78-17058-01...
A high rate-limit on one VLAN can cause a denial-of-service attack to other VLANs when the software places the port in the error-disabled state. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-6 78-17058-01...
For more information, see the “Configuring the Log Buffer” section on page 19-13. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-7 78-17058-01...
By default, no ARP access lists are defined. Note At the end of the ARP access list, there is an implicit deny ip any mac any command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-8 78-17058-01...
Page 370
Specify the Switch A interface that is connected to Switch B, and enter interface configuration mode. Step 7 no shutdown Enable the port, if necessary. By default, UNIs are disabled, and NNIs are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-9 78-17058-01...
If you enter the no ip arp inspection limit interface configuration command, the interface reverts to its default rate limit. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-10...
Page 372
To return to the default rate-limit configuration, use the no ip arp inspection limit interface configuration command. To disable error recovery for dynamic ARP inspection, use the no errdisable recovery cause arp-inspection global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-11 78-17058-01...
To disable checking, use the no ip arp inspection validate [src-mac] [dst-mac] [ip] global configuration command. To display statistics for forwarded, dropped, and MAC and IP validation failure packets, use the show ip arp inspection statistics privileged EXEC command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-12 78-17058-01...
The logs and interval settings interact. If the logs number X is greater than interval seconds Y, X divided by Y (X/Y) system messages are sent every second. Otherwise, one system message is sent every Y divided by X (Y/X) seconds. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-13 78-17058-01...
ARP inspection for the specified VLAN. If no VLANs are specified or if a range is specified, displays information only for VLANs with dynamic ARP inspection enabled (active). Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-14 78-17058-01...
Page 376
Displays the configuration and contents of the dynamic ARP inspection log buffer. For more information about these commands, see the command reference for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 19-15 78-17058-01...
For complete syntax and usage information for the commands used in this chapter, see the switch command reference for this release and the “IP Multicast Routing Commands” section in the Cisco IOS IP Command Reference, Volume 3 of 3:Multicast, Release 12.2.
BISS constrains the flooding of multicast traffic when your network includes IGMPv3 hosts. It constrains traffic to approximately the same set of ports as the IGMP snooping feature on IGMPv2 or IGMPv1 hosts. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-2 78-17058-01...
(IGMP join message) to the group. The switch CPU uses the information in the IGMP report to set up a forwarding-table entry, as shown in Table 20-1, that includes the port numbers connected to Host 1 and the router. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-3 78-17058-01...
Page 381
• Snooping on IGMP queries and Protocol Independent Multicast (PIM) packets • Statically connecting to a multicast router port with the ip igmp snooping mrouter global configuration command Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-4 78-17058-01...
100 to 5000 milliseconds. The timer can be set either globally or on a per-VLAN basis. The VLAN configuration of the leave time overrides the global configuration. For configuration steps, see the “Configuring the IGMP Leave Timer” section on page 20-10. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-5 78-17058-01...
(Optional) Save your entries in the configuration file. To disable IGMP snooping on a VLAN interface, use the no ip igmp snooping vlan vlan-id global configuration command for the specified VLAN number. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-7 78-17058-01...
Configuring a Host Statically to Join a Group Hosts or Layer 2 ports normally join multicast groups dynamically, but you can also statically configure a host on an interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-8 78-17058-01...
Verify that Immediate Leave is enabled on the VLAN interface. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-9 78-17058-01...
IGMP leave timer to the default setting. Use the no ip igmp snooping vlan vlan-id last-member-query-interval global configuration command to remove the configured IGMP leave-time setting from the specified VLAN. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-10 78-17058-01...
TCN event. Leaves are always sent if the switch is the spanning-tree root regardless of this configuration command. By default, query solicitation is disabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-11 78-17058-01...
Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file. To re-enable multicast flooding on an interface, use the ip igmp snooping tcn flood interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-12 78-17058-01...
(Optional) Verify that the IGMP snooping querier is enabled on the VLAN interface. The VLAN ID range is 1 to 1001 and 1006 to 4094. Step 10 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-13 78-17058-01...
Verify that IGMP report suppression is disabled. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To re-enable IGMP report suppression, use the ip igmp snooping report-suppression global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-14 78-17058-01...
Display information about the IP address and incoming port of the detail most-recently received IGMP query message in the VLAN,and the configuration and operational state of the IGMP snooping querier in the VLAN. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-15 78-17058-01...
IGMP report to Switch A to join the appropriate multicast. If the IGMP report matches one of the configured IP multicast group addresses, the switch CPU modifies the hardware address table to include Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-16...
Page 394
With Immediate Leave, an IGMP query is not sent from the receiver port on which the Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-17...
None configured Query response time 0.5 second Multicast VLAN VLAN 1 Mode Compatible Interface (per port) default Neither a receiver nor a source port Immediate Leave Disabled on all ports Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-18 78-17058-01...
1 to 256; the default is 1). Any multicast data sent to this address is sent to all source ports on the switch and all receiver ports that have elected to receive data on that multicast address. Each multicast address would correspond to one television channel. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-19 78-17058-01...
Specify the Layer 2 port to configure, and enter interface configuration mode. Step 4 no shutdown Enable the port, if necessary. By default, UNIs are disabled, and NNIs are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-20 78-17058-01...
Page 398
Switch(config-if)# mvr type receiver Switch(config-if)# mvr vlan 22 group 228.1.23.4 Switch(config-if)# mvr immediate Switch(config)# end Switch# show mvr interface Port Type Status Immediate Leave ---- ---- ------- --------------- Gi0/2 RECEIVER ACTIVE/DOWN ENABLED Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-21 78-17058-01...
It does not control general IGMP queries. IGMP filtering has no relationship with the function that directs the forwarding of IP multicast traffic. The filtering feature operates in the same manner whether IGMP or MVR is used to forward the multicast traffic. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-22 78-17058-01...
• deny: Specifies that matching addresses are denied; this is the default. exit: Exits from igmp-profile configuration mode. • no: Negates a command or returns to its defaults. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-23 78-17058-01...
Page 401
Switch(config)# ip igmp profile 4 Switch(config-igmp-profile)# permit Switch(config-igmp-profile)# range 229.9.9.0 Switch(config-igmp-profile)# end Switch# show ip igmp profile 4 IGMP Profile 4 permit range 229.9.9.0 229.9.9.0 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-24 78-17058-01...
SVIs. You also can use this command on a logical EtherChannel interface but cannot use it on ports that belong to an EtherChannel port group. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-25 78-17058-01...
If you configure the throttling action as replace, the entries that were previously in the forwarding table are removed. When the maximum number of entries is in the forwarding table, the switch replaces a randomly selected entry with the received IGMP report. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-26 78-17058-01...
Page 404
IGMP group to the forwarding table when the maximum number of entries is in the table. Switch(config)# interface gigabitethernet0/1 Switch(config-if)# ip igmp max-groups action replace Switch(config-if)# end Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-27 78-17058-01...
Displays the configuration of the specified interface or the configuration of all interfaces interface-id] on the switch, including (if configured) the maximum number of IGMP groups to which an interface can belong and the IGMP profile applied to the interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 20-28 78-17058-01...
C H A P T E R Configuring Port-Based Traffic Control This chapter describes how to configure the port-based traffic control features on the Cisco ME 3400 Ethernet Access switch. Note For complete syntax and usage information for the commands used in this chapter, see the command reference for this release.
Page 407
When the storm control threshold for multicast traffic is reached, all multicast traffic except control traffic, such as bridge protocol data unit (BDPU) and Cisco Discovery Protocol (CDP) frames, are blocked. However, the switch does not differentiate between routing updates, such as OSPF, and regular multicast data traffic, so both types of traffic are blocked.
Specify the interface to be configured, and enter interface configuration mode. Step 3 no shutdown Enable the port, if necessary. By default, user network interfaces (UNIs) are disabled, and network node interfaces (NNIs) are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-3 78-17058-01...
Page 409
If you do not enter a traffic type, broadcast storm control settings are displayed. Step 8 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-4 78-17058-01...
Default Protected Port Configuration, page 21-5 • Protected Port Configuration Guidelines, page 21-6 • Configuring a Protected Port, page 21-6 • Default Protected Port Configuration The default is to have no protected ports defined. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-5 78-17058-01...
Switch(config)# interface fastethernet 0/1 Switch(config-if)# port-type NNI Switch(config-if)# no shutdown Switch(config-if)# switchport protected Switch(config-if)# end There can only be four NNIs on the Cisco ME switch at the same time. Note Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-6 78-17058-01...
To return the interface to the default condition where no traffic is blocked and normal forwarding occurs on the port, use the no switchport block {multicast | unicast} interface configuration commands. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-7...
Static secure MAC addresses—These are manually configured by using the switchport • port-security mac-address mac-address interface configuration command, stored in the address table, and added to the switch running configuration. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-8 78-17058-01...
In this mode, you are notified that a security violation has occurred. An SNMP trap is sent, a syslog message is logged, and the violation counter increments. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-9 78-17058-01...
A secure port cannot be a destination port for Switched Port Analyzer (SPAN). • A secure port cannot belong to a Fast EtherChannel or a Gigabit EtherChannel port group. • • A secure port cannot be a private-VLAN port. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-10 78-17058-01...
Set the interface switchport mode as access or trunk; an interface in the default mode (dynamic auto) cannot be configured as a secure port. Step 5 switchport port-security Enable port security on the interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-11 78-17058-01...
Page 418
VLAN as an access VLAN. Step 11 Return to privileged EXEC mode. Step 12 show port-security Verify your entries. Step 13 copy running-config (Optional) Save your entries in the configuration file. startup-config Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-13 78-17058-01...
Page 419
This example shows how to configure a static secure MAC address on VLAN 3 on a port: Switch(config)# interface gigabitethernet0/2 Switch(config-if)# switchport mode trunk Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address 0000.02000.0004 vlan 3 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-14 78-17058-01...
Specify the interface to be configured, and enter interface configuration mode. Step 3 no shutdown Enable the port, if necessary. By default, UNIs are disabled, and NNIs are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-15 78-17058-01...
Page 421
Switch(config-if)# switchport port-security aging time 2 Switch(config-if)# switchport port-security aging type inactivity Switch(config-if)# switchport port-security aging static You can verify the previous commands by entering the show port-security interface interface-id privileged EXEC command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-16 78-17058-01...
Displays the number of secure MAC addresses configured per VLAN on the specified interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-17 78-17058-01...
Page 423
Chapter 21 Configuring Port-Based Traffic Control Displaying Port-Based Traffic Control Settings Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 21-18 78-17058-01...
• Understanding CDP CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols.
The range is 10 to 255 seconds; the default is 180 seconds. Step 4 cdp advertise-v2 (Optional) Configure CDP to send Version-2 advertisements. This is the default state. Step 5 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 22-2 78-17058-01...
CDP is enabled by default on NNIs. Note Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages with connected devices. Disabling CDP can interrupt device connectivity. Beginning in privileged EXEC mode, follow these steps to disable the CDP device discovery capability:...
(Optional) Save your entries in the configuration file. This example shows how to enable CDP on a port when it has been disabled. Switch# configure terminal Switch(config)# interface gigabitethernet0/1 Switch(config-if)# cdp enable Switch(config-if)# end Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 22-4 78-17058-01...
You can limit the display to neighbors of a specific interface or expand the display to provide more detailed information. show cdp traffic Display CDP counters, including the number of packets sent and received and checksum errors. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 22-5 78-17058-01...
A unidirectional link occurs whenever traffic sent by a local device is received by its neighbor but traffic from the neighbor is not received by the local device. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 23-1 78-17058-01...
UDLD sends at least one message to inform the neighbors to flush the part of their caches affected by the status change. The message is intended to keep the caches synchronized. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 23-2...
Page 432
If UDLD is in normal mode, the logical link is considered undetermined, and UDLD does not disable the interface. Switch B Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 23-3 78-17058-01...
A UDLD-capable port cannot detect a unidirectional link if it is connected to a UDLD-incapable port of another switch. • When configuring the mode (normal or aggressive), make sure that the same mode is configured on both sides of the link. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 23-4 78-17058-01...
Specify the port to be enabled for UDLD, and enter interface configuration mode. Step 3 no shutdown Enable the port, if necessary. By default, UNIs are disabled, and NNIs are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 23-5 78-17058-01...
To display the UDLD status for the specified port or for all ports, use the show udld [interface-id] privileged EXEC command. For detailed information about the fields in the command output, see the command reference for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 23-6 78-17058-01...
You can use the SPAN or RSPAN destination port to inject traffic from a network security device. For example, if you connect a Cisco Intrusion Detection System (IDS) sensor appliance to a destination port, the IDS device can send TCP reset packets to close down the TCP session of a suspected attacker.
VLAN to a destination session monitoring the RSPAN VLAN. Each RSPAN source switch must have either ports or VLANs as RSPAN sources. The destination is always a physical port, as shown on Switch C in the figure. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-2 78-17058-01...
RSPAN VLAN. To configure an RSPAN destination session on another device, you associate the destination port with the RSPAN VLAN. The destination session collects all RSPAN VLAN traffic and sends it out the RSPAN destination port. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-3 78-17058-01...
SPAN; the destination port receives a copy of the packet even if the actual incoming packet is dropped. These features include IP standard and extended input access control lists (ACLs), ingress QoS policing, VLAN ACLs and egress QoS policing. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-4 78-17058-01...
The default configuration for local SPAN session ports is to send all packets untagged. SPAN also does not normally monitor bridge protocol data unit (BPDU) packets and Layer 2 protocols, such as Cisco Discovery Protocol (CDP), Spanning Tree Protocol (STP), and Port Aggregation Protocol (PAgP).
SPAN traffic coming from other port types is not affected by VLAN filtering; that is, all VLANs are • allowed on other ports. VLAN filtering affects only traffic forwarded to the destination SPAN port and does not affect the • switching of normal traffic. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-6 78-17058-01...
For RSPAN, the original VLAN ID is lost because it is overwritten by the RSPAN VLAN • identification. Therefore, all packets appear on the destination port as untagged. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-7 78-17058-01...
SPAN destination configuration. Changes in VLAN membership or trunk settings for a source port immediately take effect, and the respective SPAN sessions automatically adjust accordingly. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-8 78-17058-01...
You can configure a disabled port to be a source or destination port, but the SPAN function does not • start until the destination port and at least one source port or source VLAN are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-10 78-17058-01...
Page 446
This is the default. • rx—Monitor received traffic. tx—Monitor sent traffic. • You can use the monitor session session_number source Note command multiple times to configure multiple source ports. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-11 78-17058-01...
Page 447
Switch(config)# end This example shows how to disable received traffic monitoring on port 1, which was configured for bidirectional monitoring: Switch(config)# no monitor session 1 source interface gigabitethernet0/1 rx Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-12 78-17058-01...
Page 448
Beginning in privileged EXEC mode, follow these steps to create a SPAN session, to specify the source ports or VLANs and the destination ports, and to enable ingress traffic on the destination port for a network security device (such as a Cisco IDS Sensor Appliance). See the “Creating a Local SPAN Session”...
Page 449
IEEE 802.1Q encapsulation and VLAN 6 as the default ingress VLAN. Switch(config)# no monitor session 2 Switch(config)# monitor session 2 source gigabitethernet0/1 rx Switch(config)# monitor session 2 destination interface gigabitethernet0/2 encapsulation replicate ingress dot1q vlan 6 Switch(config)# end Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-14 78-17058-01...
(Optional) Save the configuration in the configuration file. To monitor all VLANs on the trunk port, use the no monitor session session_number filter global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-15 78-17058-01...
MAC address learning is not disabled on the RSPAN VLAN. • We recommend that you configure an RSPAN VLAN before you configure an RSPAN source or a destination session. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-16 78-17058-01...
For session_number, the range is 1 to 66. Specify all to remove all RSPAN sessions, local to remove all local sessions, or remote to remove all remote SPAN sessions. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-17 78-17058-01...
To remove a destination port from the SPAN session, use the no monitor session session_number destination interface interface-id global configuration command. To remove the RSPAN VLAN from the session, use the no monitor session session_number source remote vlan vlan-id. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-19 78-17058-01...
Beginning in privileged EXEC mode, follow these steps to create an RSPAN destination session, to specify the source RSPAN VLAN and the destination port, and to enable ingress traffic on the destination port for a network security device (such as a Cisco IDS Sensor Appliance). Note For details about the keywords not related to ingress traffic, see the “Creating an RSPAN Destination...
(Optional) Use a comma (,) to specify a series of VLANs or use a hyphen (-) to specify a range of VLANs. Enter a space before and after the comma; enter a space before and after the hyphen. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-21 78-17058-01...
To display the current SPAN or RSPAN configuration, use the show monitor user EXEC command. You can also use the show running-config privileged EXEC command to display configured SPAN or RSPAN sessions. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 24-22 78-17058-01...
C H A P T E R Configuring RMON This chapter describes how to configure Remote Network Monitoring (RMON) on the Cisco ME 3400 Ethernet Access switch. RMON is a standard monitoring specification that defines a set of statistics and functions that can be exchanged between RMON-compliant console systems and network probes.
Configuring RMON Alarms and Events, page 25-3 (required) • Collecting Group History Statistics on an Interface, page 25-5 (optional) • • Collecting Group Ethernet Statistics on an Interface, page 25-6 (optional) Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 25-2 78-17058-01...
(Optional) For event-number, specify the event number to trigger when the rising or falling threshold exceeds its limit. (Optional) For owner string, specify the owner • of the alarm. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 25-3 78-17058-01...
Page 461
This example also generates an SNMP trap when the event is triggered. Switch(config)# rmon event 1 log trap eventtrap description "High ifOutErrors" owner jjones Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 25-4 78-17058-01...
Display the contents of the switch history table. Step 8 copy running-config startup-config (Optional) Save your entries in the configuration file. To disable history collection, use the no rmon collection history index interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 25-5 78-17058-01...
Displays the RMON statistics table. For information about the fields in these displays, see the “System Management Commands” section in the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 25-6...
This chapter describes how to configure system message logging on the Cisco ME 3400 Ethernet Access switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. This chapter consists of these sections: •...
Table 26-4 on page 26-11. severity Single-digit code from 0 to 7 that is the severity of the message. For a description of the severity levels, see Table 26-3 on page 26-9. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 26-2 78-17058-01...
Message logging is enabled by default. It must be enabled to send messages to any destination other than the console. When enabled, log messages are sent to a logging process, which logs messages to designated locations asynchronously to the processes that generated the messages. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 26-3 78-17058-01...
EXEC command to view the free processor memory on the switch. However, this value is the maximum available, and the buffer size should not be set to this amount. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 26-4 78-17058-01...
Unsolicited messages and debug command output appears on the console after the prompt for user input Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 26-5...
Page 469
(Optional) Save your entries in the configuration file. To disable synchronization of unsolicited messages and debug output, use the no logging synchronous [level severity-level | all] [limit number-of-buffers] line configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 26-6 78-17058-01...
To disable logging to syslog servers, use the no logging trap global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 26-8...
Change the default level of syslog messages stored in the history file and sent to the SNMP server. Table 26-3 on page 26-9 for a list of level keywords. By default, warnings, errors, critical, alerts, and emergencies messages are sent. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 26-9 78-17058-01...
Displaying the Logging Configuration To display the logging configuration and the contents of the log buffer, use the show logging privileged EXEC command. For information about the fields in this display, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2.
Cisco ME 3400 Ethernet Access switch. Note For complete syntax and usage information for the commands used in this chapter, see the switch command reference for this release and to the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. This chapter consists of these sections: Understanding SNMP, page 27-1 •...
A combination of the security level and the security model determine which security mechanism is used when handling an SNMP packet. Available security models are SNMPv1, SNMPv2C, and SNMPv3. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-2 78-17058-01...
1. With this operation, an SNMP manager does not need to know the exact variable name. A sequential search is performed to find the needed variable from within a table. 2. The get-bulk command only works with SNMPv2 or later. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-3 78-17058-01...
SNMP Network Get-request, Get-next-request, Network device Get-bulk, Set-request Get-response, traps SNMP Agent SNMP Manager For information on supported MIBs and how to access them, see Appendix A, “Supported MIBs.” Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-4 78-17058-01...
Physical (such as Gigabit Ethernet or SFP -module interfaces) 10000–14500 Null 14501 1. SVI = switch virtual interface 2. SFP = small form-factor pluggable The switch might not use sequential values within a range. Note Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-5 78-17058-01...
An SNMP group is a table that maps SNMP users to SNMP views. An SNMP user is a member of an SNMP group. An SNMP host is the recipient of an SNMP trap operation. An SNMP engine ID is a name for the local or remote SNMP engine. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-6 78-17058-01...
The no snmp-server global configuration command disables all running versions (Version 1, Version 2C, and Version 3) on the device. No specific Cisco IOS command exists to enable SNMP. The first snmp-server global configuration command that you enter enables all versions of SNMP.
Recall that the access list is always terminated by an implicit deny statement for everything. Step 4 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-8 78-17058-01...
If you select remote, specify the ip-address of the device that • contains the remote copy of SNMP and the optional User Datagram Protocol (UDP) port to use for storing data on the remote device. The default is 162. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-9 78-17058-01...
Page 485
64 characters) that is the name of the view in which you specify a notify, inform, or trap. (Optional) Enter access access-list with a string (not to exceed • 64 characters) that is the name of the access list. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-10 78-17058-01...
A trap manager is a management station that receives and processes traps. Traps are system alerts that the switch generates when certain events occur. By default, no trap manager is defined, and no traps are sent. Switches running this Cisco IOS release can have an unlimited number of trap managers. Note Many commands use the word traps in the command syntax.
Page 487
Generates a trap for Open Shortest Path First (OSPF) changes. You can enable any or all of these traps: Cisco specific, errors, link-state advertisement, rate limit, retransmit, and state changes. Generates a trap for Protocol-Independent Multicast (PIM) changes. You can enable any or all of these traps: invalid PIM messages, neighbor changes, and rendezvous point (RP)-mapping changes.
Page 488
When version 3 is specified, enter the SNMPv3 username. • (Optional) For notification-type, use the keywords listed in Table 27-5 on page 27-12. If no type is specified, all notifications are sent. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-13 78-17058-01...
Building 3/Room 222 Step 4 Return to privileged EXEC mode. Step 5 show running-config Verify your entries. Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-14 78-17058-01...
Switch(config)# snmp-server community public Switch(config)# snmp-server enable traps mac-notification Switch(config)# snmp-server host 192.180.1.27 version 2c public Switch(config)# snmp-server host 192.180.1.111 version 1 public Switch(config)# snmp-server host 192.180.1.33 public Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 27-15 78-17058-01...
Switch(config)# snmp-server enable traps entity Switch(config)# snmp-server host cisco.com restricted entity This example shows how to enable the switch to send all traps to the host myhost.cisco.com using the community string public: Switch(config)# snmp-server enable traps Switch(config)# snmp-server host myhost.cisco.com public...
C H A P T E R Configuring Network Security with ACLs This chapter describes how to configure network security on the Cisco ME 3400 Ethernet Access switch by using access control lists (ACLs), which are also referred to in commands and tables as access lists.
ACL is applied are filtered by the port ACL. Outgoing routed IPv4 packets are filtered by the router ACL. Other packets are not filtered. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-2 78-17058-01...
Layer 2 input would allow Host A to access the Human Resources network, but prevent Host B from accessing the same network. Port ACLs can only be applied to Layer 2 interfaces in the inbound direction. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-3 78-17058-01...
• Standard IP access lists use source addresses for matching operations. • Extended IP access lists use source and destination addresses and optional protocol type information for matching operations. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-4 78-17058-01...
Layer 4 information, such as TCP or UDP port numbers, ICMP type and code, and so on. All other fragments are missing this information. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-5...
ACEs were checking different hosts. Configuring IPv4 ACLs Configuring IP v4ACLs on the switch is the same as configuring IPv4 ACLs on other Cisco switches and routers. The process is briefly described here. For more detailed information on configuring ACLs, see the “Configuring IP Services”...
Chapter 28 Configuring Network Security with ACLs Configuring IPv4 ACLs The switch does not support these Cisco IOS router ACL-related features: • Non-IP protocol ACLs (see Table 28-1 on page 28-8) or bridge-group ACLs • IP accounting • Inbound and outbound rate limiting (except with QoS ACLs) Reflexive ACLs or dynamic ACLs •...
Because routing is done in hardware and logging is done in software, if a large number of packets match a permit or deny ACE containing a log keyword, the software might not be able to match the hardware processing rate, and not all packets will be logged. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-8 78-17058-01...
With standard access lists, if you omit the mask from an associated IP host address ACL specification, 0.0.0.0 is assumed to be the mask. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-9 78-17058-01...
For more details on the specific keywords for each protocol, see these command references: • Cisco IOS IP Command Reference, Volume 1 of 3: Addressing and Services, Release 12.2 • Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2 •...
Page 502
DSCP value specified by a number • from 0 to 63, or use the question mark (?) to see a list of available values. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-11 78-17058-01...
Page 503
TCP port. To see TCP port names, use the ? or see the “Configuring IP Services” section in the “IP Addressing and Services” chapter of the Cisco IOS IP Configuration Guide, Release 12.2. Use only TCP port numbers or names when filtering TCP.
Page 504
ICMP message type and code name. To see a list of ICMP message type names and code names, use the ?, or see the “Configuring IP Services” section of the Cisco IOS IP Configuration Guide, Release 12.2. Step 2e access-list access-list-number (Optional) Define an extended IGMP access list and the access conditions.
Define a standard IPv4 access list using a name, and enter access-list configuration mode. Note The name can be a number from 1 to 99. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-14 78-17058-01...
Page 506
After you create an ACL, any additions are placed at the end of the list. You cannot selectively add ACL entries to a specific ACL. However, you can use no permit and no deny access-list configuration mode commands to remove entries from a named ACL. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-15 78-17058-01...
Assign a meaningful name (for example, workhours) to the time range to be created, and enter time-range configuration mode. The name cannot contain a space or quotation mark and must begin with a letter. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-16 78-17058-01...
Page 508
Switch(config)# access-list 188 permit tcp any any time-range workhours Switch(config)# end Switch# show access-lists Extended IP access list 188 10 deny tcp any any time-range new_year_day_2006 (inactive) 20 permit tcp any any time-range workhours (inactive) Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-17 78-17058-01...
For procedures for applying ACLs to interfaces, see the “Applying an IPv4 ACL to an Interface” section on page 28-19. For applying ACLs to VLANs, see the “Configuring VLAN Maps” section on page 28-29. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-18 78-17058-01...
These access-group denied packets are not dropped in hardware but are bridged to the switch CPU so that it can generate the ICMP-unreachable message. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-19...
Page 511
When you apply an undefined ACL to an interface, the switch acts as if the ACL has not been applied to the interface and permits all packets. Remember this behavior if you use undefined ACLs for network security. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-20 78-17058-01...
This section provides examples of configuring and applying IPv4 ACLs. For detailed information about compiling ACLs, see the Cisco IOS Security Configuration Guide, Release 12.2 and to the Configuring IP Services” section in the “IP Addressing and Services” chapter of the Cisco IOS IP Configuration Guide, Release 12.2.
Page 513
Switch(config)# access-list 106 permit ip any 172.20.128.64 0.0.0.31 Switch(config)# end Switch# show access-lists Extended IP access list 106 10 permit ip any 172.20.128.64 0.0.0.31 Switch(config)# interface gigabitethernet0/1 Switch(config-if)# ip access-group 106 in Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-22 78-17058-01...
This example creates a standard ACL named internet_filter and an extended ACL named marketing_group. The internet_filter ACL allows all traffic from the source address 1.2.3.4. Switch(config)# ip access-list standard Internet_filter Switch(config-ext-nacl)# permit 1.2.3.4 Switch(config-ext-nacl)# exit Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-23 78-17058-01...
Switch(config)# access-list 100 deny host 171.69.3.85 any eq www Switch(config)# access-list 100 remark Do not allow Smith to browse the web Switch(config)# access-list 100 deny host 171.69.3.13 any eq www Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-24 78-17058-01...
0.0.0.255 and denies all UDP packets. Switch(config)# ip access-list extended ext1 Switch(config-ext-nacl)# permit icmp any 10.1.1.0 0.0.0.255 log Switch(config-ext-nacl)# deny udp any any log Switch(config-std-nacl)# exit Switch(config)# interface gigabitethernet0/2 Switch(config-if)# ip access-group ext1 in Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-25 78-17058-01...
Beginning in privileged EXEC mode, follow these steps to create a named MAC extended ACL: Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 mac access-list extended name Define an extended MAC access list using a name. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-26 78-17058-01...
Page 518
Switch(config-ext-macl)# deny any any decnet-iv Switch(config-ext-macl)# permit any any Switch(config-ext-macl)# end Switch # show access-lists Extended MAC access list mac1 10 deny any any decnet-iv 20 permit any any Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-27 78-17058-01...
ACL to an interface, the switch acts as if the ACL has not been applied and permits all packets. Remember this behavior if you use undefined ACLs for network security. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-28...
“Using VLAN Maps in Your Network” section on page 28-34 for configuration examples. • For information about using both router ACLs and VLAN maps, see the “VLAN Maps and Router ACL Configuration Guidelines” section on page 28-36. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-30 78-17058-01...
IP packet that does not match any of the match clauses. Switch(config)# ip access-list extended ip1 Switch(config-ext-nacl)# permit tcp any any Switch(config-ext-nacl)# exit Switch(config)# vlan access-map map_1 10 Switch(config-access-map)# match ip address ip1 Switch(config-access-map)# action drop Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-31 78-17058-01...
Page 523
• Drop all other non-IP packets • • Forward all IP packets Switch(config)# mac access-list extended good-hosts Switch(config-ext-macl)# permit host 000.0c00.0111 any Switch(config-ext-macl)# permit host 000.0c00.0211 any Switch(config-ext-nacl)# exit Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-32 78-17058-01...
To remove the VLAN map, use the no vlan filter mapname vlan-list list global configuration command. This example shows how to apply VLAN map 1 to VLANs 20 through 22: Switch(config)# vlan filter map 1 vlan-list 20-22 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-33 78-17058-01...
Next, create VLAN access map map2 so that traffic that matches the http access list is dropped and all other IP traffic is forwarded. Switch(config)# vlan access-map map2 10 Switch(config-access-map)# match ip address http Switch(config-access-map)# action drop Switch(config-access-map)# exit Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-34 78-17058-01...
Define the IP ACL that will match the correct packets. Switch(config)# ip access-list extended SERVER1_ACL Switch(config-ext-nacl))# permit ip 10.1.2.0 0.0.0.255 host 10.1.1.100 Switch(config-ext-nacl))# permit ip host 10.1.1.4 host 10.1.1.100 Switch(config-ext-nacl))# permit ip host 10.1.1.8 host 10.1.1.100 Switch(config-ext-nacl))# exit Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-35 78-17058-01...
If you must configure a router ACL and a VLAN map on the same VLAN, use these guidelines for both router ACL and VLAN map configuration: • You can configure only one VLAN map and one router ACL in each direction (input/output) on a VLAN interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-36 78-17058-01...
ACL is applied on packets that are switched within a VLAN. Packets switched within the VLAN without being routed or forwarded are only subject to the VLAN map of the input VLAN. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-37 78-17058-01...
(numbered or named). show ip access-lists [number | name] Displays the contents of all current IP access lists or a specific IP access list (numbered or named). Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-39 78-17058-01...
Page 531
Shows information about all VLAN access-maps or the specified access map. show vlan filter [access-map name | vlan vlan-id] Shows information about all VLAN filters or about a specified VLAN or VLAN access map. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 28-40 78-17058-01...
Monitoring Control-Plane Security, page 29-5 Understanding Control-Plane Security The Cisco ME switch can have no more than four ports configured as network node interfaces (NNIs) that connect to the service-provider network. The switch communicates with the rest of the network through these ports, exchanging protocol control packets as well as regular traffic.
Page 533
(BPDUs). – Control packets that are dropped by default but can be enabled or tunneled, such as Cisco Discovery Protocol (CDP), Spanning-Tree Protocol (STP), VLAN Trunking Protocol (VTP), UniDirectional Link Detection (UDLD) protocol, Link Aggregation Control Protocol (LACP), and Port Aggregation Protocol (PAgP) packets.
Page 534
Switch# show platform policer cpu interface fastethernet 0/1 Policers assigned for CPU protection ========================================================= Feature Policer Physical Index Policer ========================================================= Fa0/1 LACP 8021X RSVD_STP PVST_PLUS UDLD PAGP CISCO_L2 KEEPALIVE SWITCH_MAC SWITCH_ROUTER_MAC SWITCH_IGMP SWITCH_L2PT Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 29-3 78-17058-01...
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default threshold rate, use the no policer cpu uni global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 29-4 78-17058-01...
Displays CPU policer information for the switch. rate} drop [policer-number]—show the number of dropped frames for all • policer numbers or the specified policer number. rate—show the configured threshold rate for CPU policers. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 29-5 78-17058-01...
This chapter describes how to configure quality of service (QoS) by using the modular QoS command-line interface (CLI), or MQC, commands on the Cisco ME 3400 Ethernet Access switch. With QoS, you can provide preferential treatment to certain types of traffic at the expense of others. When QoS is not configured, the switch offers best-effort service to each packet, regardless of the packet contents or size.
To configure more than one match criterion for packets, you can associate multiple traffic classes with a single traffic policy. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-3...
Input policy maps do not support queuing and scheduling commands, such as bandwidth, queue-limit, priority, and shape average. You can configure a maximum of 32 total classes in an input policy. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-4 78-17058-01...
Layer 3 IP packets can carry either an IP precedence value or a DSCP value. QoS supports the use of either value because DSCP values are backward-compatible with IP precedence values. IP precedence values range from 0 to 7. DSCP values range from 0 to 63. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-5 78-17058-01...
After a packet is matched against the class-map criteria, it is acted on by the associated action specified in a policy map. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-6...
You can use the match command to classify Layer 2 traffic based on the CoS value, which ranges from 0 to 7. Note A match cos command is supported only on Layer 2 IEEE 802.1Q trunk ports. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-7 78-17058-01...
Match packets with CS1(precedence 1) dscp (001000) Match packets with CS2(precedence 2) dscp (010000) Match packets with CS3(precedence 3) dscp (011000) Match packets with CS4(precedence 4) dscp (100000) Match packets with CS5(precedence 5) dscp (101000) Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-8 78-17058-01...
Less than best-effort data—noncritical, bandwidth-intensive data traffic given the least preference. This is the first traffic type to be dropped. Level 1 Level 2 Level 3 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-9 78-17058-01...
You can also use QoS groups to identify traffic entering a particular interface if the traffic must be treated differently at the output based on the input interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-10 78-17058-01...
CoS values to a DSCP value of 63. Switch(config)# table-map cos-dscp-tablemap Switch(config-tablemap)# map from 5 to 46 Switch(config-tablemap)# map from 6 to 56 Switch(config-tablemap)# map from 7 to 57 Switch(config-tablemap)# default 63 Switch(config-tablemap)# exit Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-11 78-17058-01...
Queuing, Receive to the committed Classify scheduling, information rate (CIR) and shaping Packets that exceed the CIR An exceed-action at this Drop point results in dropped or reclassified packets. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-12 78-17058-01...
CoS, DSCP, or IP precedence to a value defined in a table map and then send the packet. Table maps list specific traffic attributes and map (or convert) them to other attributes. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-13...
IP classification, the from–type action in the table map must be either dscp or precedence. If the class map represents a non-IP classification, the from–type action in the table map must be cos. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-14 78-17058-01...
Maps with Class-Based Priority Queuing” section on page 30-48. Note You cannot configure a policer committed burst size for an unconditional priority policer. Any configured burst size is ignored. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-15 78-17058-01...
If the class map represents a non-IP classification, the from-type action in the table map must be cos. After you create a table map, you configure a policy map to use the table map. See the “Congestion Management and Scheduling” section on page 30-18. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-16 78-17058-01...
Page 554
Flow Chart for Marking Traffic Start Create a class map Using a Create a table map table map? Create a policy map Create additional policy maps? Attach policy map(s) to interface Finish Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-17 78-17058-01...
In this case, you can configure the other traffic classes with bandwidth or shape average, depending on requirements. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-18 78-17058-01...
The switch supports separate queues for three classes of traffic. The fourth queue is always the default queue for class class-default, unclassified traffic. In the Cisco ME switch, configuring traffic shaping also automatically sets the minimum bandwidth Note guarantee or committed information rate (CIR) of the queue to the same value as the PIR.
Page 557
This is an example of a parent-child configuration: Switch(config)# policy-map parent Switch(config-pmap)# class class-default Switch(config-pmap-c)# shape average 50000000 Switch(config-pmap-c)# service-policy child Switch(config-pmap-c)# exit Switch(config-pmap)# exit Switch(config)# interface fastethernet0/1 Switch(config-if)# service-policy output parent Switch(config-if)# exit Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-20 78-17058-01...
Using this combination of commands configures a maximum rate on the priority queue, and you can use the bandwidth and shape average policy-map commands for other classes to allocate traffic rates on other queues. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-22 78-17058-01...
You cannot configure queue size by using the queue-limit policy map class command without first configuring a scheduling action (bandwidth, shape average, or priority). For more information, see the “Configuring Output Policy Maps with Class-Based-Weighted-Queuing” section on page 30-44. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-24 78-17058-01...
Page 562
However, there is no limit to the number of qualifiers that you can map to these thresholds. You can configure a third threshold value to set the maximum queue by using the queue-limit command with no qualifiers. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-25 78-17058-01...
These sections describe how to create QoS ACLs: “Creating IP Standard ACLs” section on page 30-28 • • “Creating IP Extended ACLs” section on page 30-29 • “Creating Layer 2 MAC ACLs” section on page 30-30 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-27 78-17058-01...
The name can be a number from 100 to 199. In access-list configuration mode, enter permit protocol {source source-wildcard destination destination-wildcard} [precedence precedence] [tos tos] [dscp dscp] as defined in Step 2. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-29 78-17058-01...
In an output policy map, no two class maps can have the same classification criteria; that is, the same • match qualifiers and values. The maximum number of class maps on the switch is 256. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-31 78-17058-01...
Page 569
For qos-group value, specify the QoS group number. The range is • 0 to15. Matching of QoS groups is supported only in output policy maps. Step 4 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-32 78-17058-01...
The switch supports a maximum of 256 unique table maps. The maximum number of map statements within a table map is 64. • Table maps cannot be used in output policy maps. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-33 78-17058-01...
Page 571
Switch(config-tablemap)# map from 3 to 1 Switch(config-tablemap)# map from 4 to 2 Switch(config-tablemap)# map from 5 to 2 Switch(config-tablemap)# map from 6 to 3 Switch(config-tablemap)# default 4 Switch(config-tablemap)# end Switch# show table-map dscp-to-cos Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-34 78-17058-01...
You can add or delete classification criteria, add or delete classes, add or delete actions, or change the parameters of the configured actions (policers, rates, mapping, marking, and so on). • You cannot configure hierarchical policy maps as input policy maps. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-35 78-17058-01...
Step 3 class class-map-name Enter a class-map name and enter policy-map class configuration mode. You must have already created the class map by using the class-map global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-36 78-17058-01...
Page 574
Step 11 Return to privileged EXEC mode. Step 12 show policy-map [policy-map-name [class Verify your entries. class-map-name]] Step 13 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-37 78-17058-01...
If the associated class map represents a non-IP classification, the map from type of action that references the table map must be cos. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-39 78-17058-01...
Page 577
(Optional) Save your entries in the configuration file. After you have created an aggregate policer, you attach it to an ingress port. See the “Attaching a Traffic Policy to an Interface” section on page 30-35. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-40 78-17058-01...
Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 policy-map policy-map-name Create a policy map by entering the policy map name, and enter policy-map configuration mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-41 78-17058-01...
Page 579
Switch(config-pmap)# class class-default Switch(config-pmap-c)# set ip dscp 1 Switch(config-pmap-c)# exit Switch(config-pmap)# class AF31-AF33 Switch(config-pmap-c)# set ip dscp 3 Switch(config-pmap-c)# exit Switch(config-pmap)# exit Switch(config)# interface fastethernet0/1 Switch(config-if)# service-policy input Example Switch(config-if)# exit Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-42 78-17058-01...
If an output policy-map is configured on a port that is set for autonegotiation and the speed autonegotiates to a value that invalidates the policy, the port is put in the error-disabled state. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-43...
Create a policy map by entering the policy map name, and enter policy-map configuration mode. Step 3 class class-map-name Enter a class-map name, and enter policy-map class configuration mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-44 78-17058-01...
Configuring a queue for traffic shaping sets the maximum bandwidth or peak information rate (PIR) of the queue. In the Cisco ME switch, configuring traffic shaping automatically also sets the minimum bandwidth guarantee or CIR of the queue to the same value as the PIR.
This command does not guarantee the allocated bandwidth, but does ensure the rate of distribution. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-48 78-17058-01...
Page 586
Use the no form of the appropriate command to delete an existing policy map or class map or to cancel strict priority queuing for the priority class or the bandwidth setting for the other classes. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-49...
Page 587
Step 5 priority Configure this class as the priority class. Note Only one unique class map on the switch can be associated with a priority command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-50 78-17058-01...
Page 588
Exit policy-map class configuration mode for the priority class. Step 10 class class-map-name Enter the name of the first nonpriority class, and enter policy-map class configuration mode for that class. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-51 78-17058-01...
30-46, the “Configuring Output Policy Maps with priority Port Shaping” section on page 30-47, or the “Configuring Output Policy Maps with Class-Based Priority Queuing” section on page 30-48. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-53 78-17058-01...
This count includes the total number of packets that are sent and dropped for that class. You can use the same command to view the per-class tail drop statistics. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-55 78-17058-01...
Configuration Examples for Policy Maps Configuration Examples for Policy Maps This section includes configuration examples for configuring QoS policies on the Cisco ME switch, including configuration limitations and restrictions. The sections are broken into different configurations actions that a customer might do. Each section provides the exact sequence of steps that you must follow for successful configuration or modification.
Page 594
Switch(config)# policy-map output-g1-2 Switch(config-pmap)# class gold-out Switch(config-pmap-c)# priority Switch(config-pmap-c)# police 50000000 Switch(config-pmap-c)# exit Switch(config-pmap)# class silver-out Switch(config-pmap-c)# shape average 200000 Switch(config-pmap-c)# exit Switch(config-pmap)# class bronze-out Switch(config-pmap-c)# bandwidth percent 10 Switch(config-pmap-c)# exit Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-57 78-17058-01...
You must assign an action to each class; that is, there can be no empty class. • Each class configuration must be based on the classification/marking done in the input policy-map. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-58 78-17058-01...
Switch(config)# class-map match-any silver-out Switch(config-cmap)# match ip dscp af21 Switch(config-cmap)# match ip dscp cs5 Switch(config-cmap)# exit You should use the same procedure when deleting a match statement associated with a configured class. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-59 78-17058-01...
Shut down all active ports carrying the policy to be modified. • Detach the output policy from all ports to which it is attached. Make modifications to the output policy. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-60 78-17058-01...
In the initial configuration, Fast Ethernet ports 1 through 12 are UNIs and are active. Fast Ethernet ports 13 through 24 are UNIs and are shut down. Gigabit Ethernet ports 1 and 2 are NNIs and are enabled by default. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-61 78-17058-01...
Page 600
Ethernet port 2 might be reordered if a flow splits across more than one queue. You can avoid this problem by leaving ports in a shut-down state until an output policy is attached. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 30-63...
C H A P T E R Configuring EtherChannels This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the Cisco ME 3400 Ethernet Access switch. EtherChannel provides fault-tolerant high-speed links between switches, routers, and servers. You can use it to increase the bandwidth between the wiring closets and the data center, and you can deploy it anywhere in the network where bottlenecks are likely to occur.
Layer 3 mode by using the no switchport interface configuration command. For more information, see the Chapter 9, “Configuring Interface Characteristics.” Note The switch must be running the metro IP access image to support Layer 3 ports. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-2 78-17058-01...
The switch must be running the metro IP access image to support Layer 3 ports. Note Each EtherChannel has a port-channel logical interface numbered from 1 to 48. This port-channel interface number corresponds to the one specified with the channel-group interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-3 78-17058-01...
EtherChannel, apply the configuration commands to the port-channel interface. Port Aggregation Protocol The Port Aggregation Protocol (PAgP) is a Cisco-proprietary protocol that can be run only on Cisco switches and on those switches licensed by vendors to support PAgP. PAgP facilitates the automatic creation of EtherChannels by exchanging PAgP packets between Ethernet ports.
PAgP Interaction with Other Features Cisco Discovery Protocol (CDP) sends and receives packets over the physical ports in the EtherChannel. Trunk ports send and receive PAgP protocol data units (PDUs) on the lowest numbered VLAN.
Understanding EtherChannels Link Aggregation Control Protocol The LACP is defined in IEEE 802.3ad standard and enables Cisco switches to manage Ethernet channels between switches that conform to the standard. LACP facilitates the automatic creation of EtherChannels by exchanging LACP packets between Ethernet ports.
Therefore, to provide load-balancing, packets from different IP addresses use different ports in the channel, but packets from the same IP address use the same port in the channel. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-7 78-17058-01...
Page 609
Using source addresses or IP addresses might result in better load balancing. Figure 31-3 Load Distribution and Forwarding Methods Switch with source-based forwarding enabled EtherChannel Cisco router with destination-based forwarding enabled Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-8 78-17058-01...
32768. LACP system ID LACP system priority and the switch MAC address. Load balancing Load distribution on the switch is based on the source-MAC address of the incoming packet. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-9 78-17058-01...
If EtherChannels are configured on switch interfaces, remove the EtherChannel configuration from the interfaces before globally enabling 802.1x on a switch by using the dot1x system-auth-control global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-10 78-17058-01...
If you configure the port as a static-access port, assign it to only one VLAN. The range is 1 to 4094. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-11 78-17058-01...
Page 613
Verify your entries. Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file. To remove a port from the EtherChannel group, use the no channel-group interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-12 78-17058-01...
NNIs are enabled. Step 4 no switchport Put the interface into Layer 3 mode. Step 5 ip address ip-address mask Assign an IP address and subnet mask to the EtherChannel. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-13 78-17058-01...
PAgP or LACP. Step 3 no ip address Ensure that there is no IP address assigned to the physical port. Step 4 no switchport Put the port into Layer 3 mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-14 78-17058-01...
Page 616
“LACP Modes” section on page 31-6. Step 6 Return to privileged EXEC mode. Step 7 show running-config Verify your entries. Step 8 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-15 78-17058-01...
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return EtherChannel load balancing to the default configuration, use the no port-channel load-balance global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-16 78-17058-01...
PAgP interoperability with devices that only support address learning by physical ports. When the link partner to the switch is a physical learner, we recommend that you configure the Cisco ME switch as a physical-port learner by using the pagp learn-method physical-port interface configuration command.
16 ports. Only eight LACP links can be active at one time. The software places any additional links in a hot-standby mode. If one of the active links becomes inactive, a link that is in the hot-standby mode becomes active in its place. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-18 78-17058-01...
Step 3 Return to privileged EXEC mode. Step 4 show running-config Verify your entries. show lacp sys-id Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-19 78-17058-01...
(Optional) Save your entries in the configuration file. To return the LACP port priority to the default value, use the no lacp port-priority interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-20 78-17058-01...
You can clear LACP channel-group information and traffic counters by using the clear lacp {channel-group-number counters | counters} privileged EXEC command. For detailed information about the fields in the displays, see the command reference for this release. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-21 78-17058-01...
Page 623
Chapter 31 Configuring EtherChannels Displaying EtherChannel, PAgP, and LACP Status Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 31-22 78-17058-01...
C H A P T E R Configuring IP Unicast Routing This chapter describes how to configure IP Version 4 (IPv4) unicast routing on the Cisco ME 3400 Ethernet Access switch. Note Routing is supported only on switches that are running the metro IP access image.
Distance-vector protocols use one or a series of metrics for calculating the best routes. These protocols are easy to configure and use. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-2...
Steps for Configuring Routing By default, IPv4 routing is disabled on the switch, and you must enable it before routing can take place. For detailed IP routing configuration information, see the Cisco IOS IP Configuration Guide, Release 12.2 In the following procedures, the specified interface must be one of these Layer 3 interfaces: •...
If a helper address is defined or User Datagram Protocol (UDP) flooding is configured, UDP forwarding is enabled on default ports. Any-local-broadcast: Disabled. Turbo-flood: Disabled. IP helper address Disabled. IP host Disabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-4 78-17058-01...
Step 7 show interfaces [interface-id] Verify your entries. show ip interface [interface-id] show running-config interface [interface-id] Step 8 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-5 78-17058-01...
Ethernet, the software must learn the MAC address of the device. The process of learning the MAC address from an IP address is called address resolution. The process of learning the IP address from the MAC address is called reverse address resolution. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-7 78-17058-01...
RARP requires a RARP server on the same network segment as the router interface. Use the ip rarp-server address interface configuration command to identify the server. For more information on RARP, see the Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.2.
Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file. To disable an encapsulation type, use the no arp arpa or no arp snap interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-9 78-17058-01...
Proxy ARP is enabled by default. To enable it after it has been disabled, see the “Enable Proxy ARP” section on page 32-10. Proxy ARP works as long as other routers support it. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-10 78-17058-01...
Step 3 no shutdown Enable the interface if necessary. By default, UNIs are disabled and NNIs are enabled. Step 4 ip irdp Enable IRDP processing on the interface. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-11 78-17058-01...
You can also limit broadcast, unicast, and multicast traffic on Layer 2 interfaces by using the Note storm-control interface configuration command to set traffic suppression levels. For more information, Chapter 21, “Configuring Port-Based Traffic Control.” Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-12 78-17058-01...
By default, both UDP and ND forwarding are enabled if a helper address has been defined for an interface. The description for the ip forward-protocol interface configuration command in the Cisco IOS IP Command Reference, Volume 1 of 3: Addressing and Services, Release 12.2 lists the ports that are forwarded by default if you do not specify any UDP ports.
Packets that are forwarded to a single network address using the IP helper-address mechanism can be flooded. Only one copy of the packet is sent on each network segment. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-15 78-17058-01...
Page 639
Verify your entry. Step 5 copy running-config startup-config (Optional) Save your entry in the configuration file. To disable this feature, use the no ip forward-protocol turbo-flood global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-16 78-17058-01...
Beginning in privileged EXEC mode, follow these steps to enable IP routing: Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 ip routing Enable IP routing. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-17 78-17058-01...
Protocol (UDP) data packets to exchange routing information. The protocol is documented in RFC 1058. You can find detailed information about RIP in IP Routing Fundamentals, published by Cisco Press. Using RIP, the switch sends routing information updates (advertisements) every 30 seconds. If a router does not receive an update from another router for 180 seconds or more, it marks the routes served by that router as unusable.
Receives RIP Version 1 and 2 packets; sends Version 1 packets. Configuring Basic RIP Parameters To configure RIP, you enable RIP routing for a network and optionally configure other parameters. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-19 78-17058-01...
Page 643
If you are sending packets to a lower-speed device, you can add an interpacket delay in the range of 8 to 50 milliseconds. Step 12 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-20 78-17058-01...
This feature usually optimizes communication among multiple routers, especially when links are broken. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-21 78-17058-01...
Page 645
Switch(config-if)# ip address 10.1.5.1 255.255.255.0 Switch(config-if)# ip summary-address rip 10.2.0.0 255.255.0.0 Switch(config-if)# no ip split-horizon Switch(config-if)# exit Switch(config)# router rip Switch(config-router)# network 10.0.0.0 Switch(config-router)# neighbor 2.2.2.2 peer-group mygroup Switch(config-router)# end Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-22 78-17058-01...
This feature can optimize communication among multiple routers, especially when links are broken. In general, Cisco does not recommend disabling split horizon unless you are certain that your application Note requires it to properly advertise routes.
Chapter 32 Configuring IP Unicast Routing Configuring OSPF The Cisco implementation conforms to the OSPF Version 2 specifications with these key features: • Definition of stub areas is supported. • Routes learned through any IP routing protocol can be redistributed into another IP routing protocol.
Page 648
No area ID or router ID defined. Hello interval: 10 seconds. Retransmit interval: 5 seconds. Transmit delay: 1 second. Dead interval: 40 seconds. Authentication key: no key predefined. Message-digest key (MD5): no key predefined. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-25 78-17058-01...
Enter interface configuration mode, and specify the Layer 3 interface to configure. Step 3 no shutdown Enable the interface if necessary. By default, UNIs are disabled and NNIs are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-26 78-17058-01...
(ABR) generates a default external route into the stub area for destinations outside the autonomous system (AS). An NSSA does not flood all LSAs from the core into the area, but can import AS external routes within the area by redistribution. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-27 78-17058-01...
Page 651
(Optional) Save your entries in the configuration file. Use the no form of these commands to remove the configured parameter value or to return to the default value. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-28 78-17058-01...
Enable OSPF routing, and enter router configuration mode. Step 3 summary-address address mask (Optional) Specify an address and IP subnet mask for redistributed routes so that only one summary route is advertised. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-29 78-17058-01...
EXEC commands for displaying statistics. For more show ip ospf database privileged EXEC command options and for explanations of fields in the resulting display, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide...
Display OSPF-related virtual links information. Configuring EIGRP Enhanced IGRP (EIGRP) is a Cisco proprietary enhanced version of the IGRP. EIGRP uses the same distance vector algorithm and distance information as IGRP; however, the convergence properties and the operating efficiency of EIGRP are significantly improved.
Page 656
Neighbor discovery and recovery is achieved with low overhead by periodically sending small hello packets. As long as hello packets are received, the Cisco IOS software can learn that a neighbor is alive and functioning. When this status is determined, the neighboring routers can exchange routing information.
None specified. Offset-list Disabled. Router EIGRP Disabled. Set metric No metric set in the route map. Traffic-share Distributed proportionately to the ratios of the metrics. Variance 1 (equal-cost load balancing). Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-34 78-17058-01...
(Optional) Save your entries in the configuration file. Use the no forms of these commands to disable the feature or return the setting to the default value. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-35 78-17058-01...
(Optional) Save your entries in the configuration file. Use the no forms of these commands to disable the feature or return the setting to the default value. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-36 78-17058-01...
(Optional) Save your entries in the configuration file. Use the no forms of these commands to disable the feature or to return the setting to the default value. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-37 78-17058-01...
You can delete neighbors from the neighbor table. You can also display various EIGRP routing statistics. Table 32-8 lists the privileged EXEC commands for deleting neighbors and displaying statistics. For explanations of fields in the resulting display, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2. Table 32-8...
Page 662
AS-level policy decisions. A router or switch running Cisco IOS does not select or use an IBGP route unless it has a route available to the next-hop router and it has received synchronization from an IGP (unless IGP synchronization is disabled).
Protocols” part of the Cisco IOS IP Configuration Guide, Release 12.2. For details about specific commands, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2. For a list of BGP commands that are visible but not supported by the switch, see Appendix C, “Unsupported Commands in Cisco IOS Release 12.2(25)EX.”...
Page 664
Always compare: Disabled. Does not compare MEDs for paths from neighbors in • different autonomous systems. Best path compare: Disabled. • MED missing as worst path: Disabled. • Deterministic MED comparison is disabled. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-41 78-17058-01...
External neighbors are usually adjacent to each other and share a subnet, but internal neighbors can be anywhere in the same AS. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-42 78-17058-01...
Page 666
Return to privileged EXEC mode. Step 11 show ip bgp network network-number Verify the configuration. show ip bgp neighbor Step 12 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-43 78-17058-01...
Page 667
EIGRP, which also use the network command to specify where to send updates. For detailed descriptions of BGP configuration, see the “IP Routing Protocols” part of the Cisco IOS IP Configuration Guide, Release 12.2. For details about specific commands, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2.
BGP sessions so that the configuration changes take effect. There are two types of reset, hard reset and soft reset. Cisco IOS Releases 12.1 and later support a soft reset without any prior configuration. To use a soft reset without preconfiguration, both BGP peers must support the soft route refresh capability, which is advertised in the OPEN message sent when the peers establish a TCP session.
Prefer the path with the largest weight (a Cisco proprietary parameter). The weight attribute is local to the router and not propagated in routing updates. By default, the weight attribute is 32768 for paths that the router originates and zero for other paths.
Page 670
Step 10 bgp deterministic med (Optional) Configure the switch to consider the MED variable when choosing among routes advertised by different peers in the same AS. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-47 78-17058-01...
(Optional) Save your entries in the configuration file. Use the no route-map map-tag command to delete the route map. Use the no set ip next-hop ip-address command to re-enable next-hop processing. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-48 78-17058-01...
BGP autonomous system paths. Each filter is an access list based on regular expressions. (See the “Regular Expressions” appendix in the Cisco IOS Dial Technologies Command Reference, Release 12.2 for more information on forming regular expressions.) To use this method, define an autonomous system path access list, and apply it to updates to and from particular neighbors.
| (Optional) Add an entry to a prefix list, and assign a sequence permit network/len [ge ge-value] [le le-value] number to the entry. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-50 78-17058-01...
By default, no COMMUNITIES attribute is sent to a neighbor. You can specify that the COMMUNITIES attribute be sent to the neighbor at an IP address by using the neighbor send-community router configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-51 78-17058-01...
(Optional) Display and parse BGP communities in the format AA:NN. A BGP community is displayed in a two-part format 2 bytes long. The Cisco default community format is in the format NNAA. In the most recent RFC for BGP, a community takes the form AA:NN, where the first part is the AS number and the second part is a 2-byte number.
Page 676
(Optional) Apply a route map to incoming or outgoing routes. route-map map-name {in | out} Step 17 neighbor {ip-address | peer-group-name} (Optional) Specify that the COMMUNITIES attribute be sent to send-community the neighbor at this IP address. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-53 78-17058-01...
Create an aggregate entry in the BGP routing table. The aggregate route is advertised as coming from the AS, and the atomic aggregate attribute is set to indicate that information might be missing. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-54 78-17058-01...
Specify the autonomous systems that belong to the [autonomous-system ...] confederation and that will be treated as special EBGP peers. Step 5 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-55 78-17058-01...
However, if the clients are fully meshed, the route reflector does not need to reflect routes to clients. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-56 78-17058-01...
To disable flap dampening, use the no bgp dampening router configuration command without keywords. To set dampening factors back to the default values, use the no bgp dampening router configuration command with values. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-57 78-17058-01...
Table 32-8 lists the privileged EXEC commands for clearing and displaying BGP. For explanations of the display fields, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2. Table 32-11 IP BGP Clear and Show Commands...
The CE device advertises the site’s local routes to the router and learns the remote VPN routes from it. The Cisco ME 3400 switch can be a CE. Provider edge (PE) routers exchange routing information with CE devices by using static routing or •...
Page 683
VPN service, for example, small companies. In this case, multi-VRF CE support is required in the Cisco ME switches. Because multi-VRF CE is a Layer 3 feature, each interface in a VRF must be a Layer 3 interface.
A switch with multi-VRF CE is shared by multiple customers, and each customer has its own routing table. • Because customers use different VRF tables, the same IP addresses can be reused. Overlapped IP addresses are allowed in different VPNs. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-61 78-17058-01...
Beginning in privileged EXEC mode, follow these steps to configure one or more VRFs. For complete syntax and usage information for the commands, refer to the switch command reference for this release and the Cisco IOS Switching Services Command Reference, Release 12.2. Command...
Return to privileged EXEC mode. Step 7 show ip ospf process-id Verify the configuration of the OSPF network. Step 8 copy running-config startup-config (Optional) Save your entries in the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-63 78-17058-01...
32-5. OSPF is the protocol used in VPN1, VPN2, and the global network. BGP is used in the CE to PE connections. The examples following the illustration show how to configure a Cisco ME 3400 switch as CE Switch A, and the VRF configuration for customer switches D and F. Commands for configuring CE Switch C and the other customer switches are not included but would be similar.
Page 688
Switch(config)# interface loopback1 Switch(config-if)# ip vrf forwarding v11 Switch(config-if)# ip address 8.8.1.8 255.255.255.0 Switch(config-if)# exit Switch(config)# interface loopback2 Switch(config-if)# ip vrf forwarding v12 Switch(config-if)# ip address 8.8.2.8 255.255.255.0 Switch(config-if)# exit Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-65 78-17058-01...
[brief | detail | interfaces] [vrf-name] Display information about the defined VRF instances. For more information about the information in the displays, refer to the Cisco IOS Switching Services Command Reference, Release 12.2. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide...
Managing Authentication Keys, page 32-82 Configuring Cisco Express Forwarding Cisco Express Forwarding (CEF) is a Layer 3 IP switching technology used to optimize network performance. CEF implements an advanced IP look-up and forwarding algorithm to deliver maximum Layer 3 switching performance. CEF is less CPU-intensive than fast switching route caching, allowing more CPU processing power to be dedicated to packet forwarding.
Display the selected default route in the gateway of last resort display. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. Use the no ip default-network network number global configuration command to remove the route. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-72 78-17058-01...
The system periodically scans its routing table to choose the optimal default network as its default route. In IGRP networks, there might be several candidate networks for the system default. Cisco routers use administrative distance and metric information to set the default route or the gateway of last resort.
Page 697
EIGRP external routes. Step 12 set dampening halflife reuse suppress Set BGP route dampening factors. max-suppress-time Step 13 set local-preference value Assign a value to a local BGP path. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-74 78-17058-01...
Page 698
To delete an entry, use the no route-map map tag global configuration command or the no match or no set route-map configuration commands. You can distribute routes from one routing domain into another and control route distribution. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-75 78-17058-01...
For example, you could transfer stock records to a corporate office on a high-bandwidth, high-cost link for a short time while transmitting routine application data such as e-mail over a low-bandwidth, low-cost link. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-76 78-17058-01...
For details about PBR commands and keywords, see the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2. For a list of PBR commands that are visible but not supported by the switch, see Appendix C, “Unsupported Commands in Cisco IOS Release 12.2(25)EX.”...
Enter interface configuration mode, and specify the interface to configure. Step 7 no shutdown Enable the interface if necessary. By default, UNIs are disabled and NNIs are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-78 78-17058-01...
In networks with many interfaces, to avoid having to manually set them as passive, you can set all interfaces to be passive by default by using the passive-interface default router configuration command and manually setting interfaces where adjacencies are desired. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-79 78-17058-01...
[interface-name | routing updates, depending upon the action listed in the access list. process | autonomous-system-number] Step 4 distribute-list {access-list-number | Suppress processing in routes listed in updates. access-list-name} in [type-number] Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-80 78-17058-01...
Display the default administrative distance for a specified routing process. Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. To remove a distance definition, use the no distance router configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-81 78-17058-01...
Display authentication key information. Step 9 copy running-config startup-config (Optional) Save your entries in the configuration file. To remove the key chain, use the no key chain name-of-chain global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-82 78-17058-01...
Display supernets. show ip cache Display the routing table used to switch IP traffic. show route-map [map-name] Display all route maps configured or only the one specified. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-83 78-17058-01...
Page 707
Chapter 32 Configuring IP Unicast Routing Monitoring and Maintaining the IP Network Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 32-84 78-17058-01...
C H A P T E R Configuring HSRP This chapter describes how to use Hot Standby Router Protocol (HSRP) on the Cisco ME 3400 Ethernet Access switch to provide routing redundancy for routing IP traffic without being dependent on the availability of any single router.
Page 709
Host C’s segment that need to communicate with users on Host B’s segment and also continues to perform its normal function of handling packets between the Host A segment and Host B. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 33-2 78-17058-01...
For MHSRP, you need to enter the standby preempt interface configuration command on the HSRP Note interfaces so that if a router fails and then comes back up, preemption occurs and restores load sharing Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 33-3 78-17058-01...
Default HSRP Configuration Feature Default Setting HSRP groups None configured Standby group number Standby MAC address System assigned as: 0000.0c07.acXX, where XX is the HSRP group number Standby priority Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 33-4 78-17058-01...
HSRP. Step 3 no shutdown Enable the port, if necessary. By default, user network interfaces (UNIs) are disabled, and network node interfaces (NNIs) are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 33-5 78-17058-01...
Assigning priority helps select the active and standby routers. If preemption is enabled, the router • with the highest priority becomes the designated active router. If priorities are equal, the primary IP addresses are compared, and the higher IP address has priority. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 33-6 78-17058-01...
Page 714
The range is 0 to 3600(1 hour); the default is 0 (no delay before taking over). Use the no form of the command to restore the default values. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 33-7 78-17058-01...
Page 715
300 seconds (5 minutes) before attempting to become the active router: Switch# configure terminal Switch(config)# interface gigabitethernet0/1 Switch(config-if)# no switchport Switch(config-if)# standby ip 172.20.128.3 Switch(config-if)# standby priority 120 preempt delay 300 Switch(config-if)# end Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 33-8 78-17058-01...
• All routers in a Hot Standby group should use the same timer values. Normally, the holdtime is greater than or equal to 3 times the hellotime. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 33-9 78-17058-01...
Page 717
15 seconds: Switch# configure terminal Switch(config)# interface gigabitethernet0/1 Switch(config-if)# no switchport Switch(config-if)# standby 1 ip Switch(config-if)# standby 1 timers 5 15 Switch(config-if)# end Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 33-10 78-17058-01...
HSRP group. If a host is redirected by ICMP to the real MAC address of a router and that router later fails, packets from the host are lost. For more information, see the Cisco IOS IP Configuration Guide, Release 12.2. Displaying HSRP Configurations...
To use this feature, the switch must be running the metro IP access image. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS IP Note Command Reference, Volume 3 of 3: Multicast, Release 12.2.
IGMP Version 2 (IGMPv2) leave messages are destined to the address 224.0.0.2 (all-multicast-routers on a subnet). In some old host IP stacks, leave messages might be destined to the group IP address rather than to the all-routers address. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-2 78-17058-01...
Register messages to an RP specify whether they are sent by a border router or a designated router. PIM packets are no longer inside IGMP packets; they are standalone packets. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-3 78-17058-01...
This proprietary feature eliminates the need to manually configure the RP information in every router and multilayer switch in the network. For Auto-RP to work, you configure a Cisco router or multilayer switch as the mapping agent. It uses IP multicast to learn which routers or switches in the network are possible candidate RPs to receive candidate RP announcements.
(which might not be all interfaces on the router). If the RPF check fails, the packet is discarded. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-5 78-17058-01...
Page 725
(S,G) joins (which are source-tree states) are sent toward the source. • (*,G) joins (which are shared-tree states) are sent toward the RP. Dense-mode PIM uses only source trees and use RPF as previously described. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-6 78-17058-01...
To avoid misconfiguring multicast routing on your switch, review the information in these sections: PIMv1 and PIMv2 Interoperability, page 34-8 • • Auto-RP and BSR Configuration Guidelines, page 34-8 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-7 78-17058-01...
If you have a network that includes non-Cisco routers, configure the Auto-RP mapping agent and • the BSR on a Cisco PIMv2 router or multilayer switch. Ensure that no PIMv1 device is on the path between the BSR and a non-Cisco PIMv2 router.
Configuring IP Multicast Routing • If you have non-Cisco PIMv2 routers that need to interoperate with Cisco PIMv1 routers and multilayer switches, both Auto-RP and a BSR are required. We recommend that a Cisco PIMv2 device be both the Auto-RP mapping agent and the BSR. For more information, see the “Using...
For more information, see the “PIMv1 and PIMv2 Interoperability” section on page 34-8 and the “Auto-RP and BSR Configuration Guidelines” section on page 34-8. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-10 78-17058-01...
Place ones in the bit positions that you want to ignore. Recall that the access list is always terminated by an implicit deny statement for everything. Step 4 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-11 78-17058-01...
Switch(config)# ip pim rp-address 147.106.6.22 1 Configuring Auto-RP Auto-RP uses IP multicast to automate the distribution of group-to-RP mappings to all Cisco routers and multilayer switches in a PIM network. It has these benefits: It is easy to use multiple RPs within a network to serve different group ranges.
Page 732
Place ones in the bit positions that you want to ignore. Recall that the access list is always terminated by an implicit deny statement for everything. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-13 78-17058-01...
Page 733
RP must be configured as follows: Switch(config)# ip pim accept-rp 172.10.20.1 1 Switch(config)# access-list 1 permit 224.0.1.39 Switch(config)# access-list 1 permit 224.0.1.40 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-14 78-17058-01...
Page 734
(Optional) Save your entries in the configuration file. To remove a filter on incoming RP announcement messages, use the no ip pim rp-announce-filter rp-list access-list-number [group-list access-list-number] global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-15 78-17058-01...
PIM domains. This command instructs the switch to neither send or receive PIMv2 BSR messages on this interface as shown in Figure 34-2. Step 5 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-16 78-17058-01...
Page 736
Specify the interface to be configured, and enter interface configuration mode. Step 4 no shutdown Enable the port, if necessary. By default, UNIs are disabled, and NNIs are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-17 78-17058-01...
Page 737
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To remove this device as a candidate BSR, use the no ip pim bsr-candidate global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-18 78-17058-01...
Page 738
IP multicast address space or a portion of it. Candidate RPs send candidate RP advertisements to the BSR. When deciding which devices should be RPs, consider these options: In a network of Cisco routers and multilayer switches where only Auto-RP is used, any device can •...
Switch(config)# access-list 4 permit 239.0.0.0 0.255.255.255 Using Auto-RP and a BSR If there are only Cisco devices in you network (no routers from other vendors), there is no need to configure a BSR. Configure Auto-RP in a network that is running both PIMv1 and PIMv2.
RP. Figure 34-3 shows this type of shared-distribution tree. Data from senders is delivered to the RP for distribution to group members joined to the shared tree. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-21 78-17058-01...
Page 741
Multiple sources sending to groups use the shared tree. You can configure the PIM device to stay on the shared tree. For more information, see the “Delaying the Use of PIM Shortest-Path Tree” section on page 34-23. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-22 78-17058-01...
(Optional) For group-list access-list-number, specify the access list created in Step 2. If the value is 0 or if the group-list is not used, the threshold applies to all groups. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-23 78-17058-01...
Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no ip pim query-interval [seconds] interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-24 78-17058-01...
Another example is the multicast trace-route tools provided in the software. Performing this procedure might impact the CPU performance because the CPU will receive all data Caution traffic for the group address. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-25 78-17058-01...
Specify the multicast groups that hosts on the subnet serviced by an interface can join. By default, all groups are allowed on an interface. For access-list-number, specify an IP standard access list number. The range is 1 to 99. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-26 78-17058-01...
Specify the interface to be configured, and enter interface configuration mode. Step 3 no shutdown Enable the port, if necessary. By default, UNIs are disabled, and NNIs are enabled. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-27 78-17058-01...
Verify your entries. Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no ip igmp query-interval interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-28 78-17058-01...
Step 4 ip igmp query-max-response-time Change the maximum query response time advertised in IGMP queries. seconds The default is 10 seconds. The range is 1 to 25. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-29 78-17058-01...
(Optional) Save your entries in the configuration file. To remove the switch as a member of the group, use the no ip igmp static-group group-address interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-30 78-17058-01...
Verify your entries. Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file. To disable sdr support, use the no ip sdr listen interface configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-31 78-17058-01...
Similarly, the engineering and marketing departments have an administratively-scoped boundary of 239.128.0.0/16 around the perimeter of their networks. This boundary prevents multicast traffic in the range of 239.128.0.0 through 239.128.255.255 from entering or leaving their respective networks. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-32 78-17058-01...
Page 752
Enable the port, if necessary. By default, UNIs are disabled, and NNIs are enabled. Step 5 ip multicast boundary Configure the boundary, specifying the access list you created in Step 2. access-list-number Step 6 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-33 78-17058-01...
Displaying System and Network Statistics You can display specific statistics, such as the contents of IP routing tables, caches, and databases. This release does not support per-route statistics. Note Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-34 78-17058-01...
Display IP multicast packet rate and loss information. mtrace source [destination] [group] Trace the path from a source to a destination branch for a multicast distribution tree for a given group. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-35 78-17058-01...
Page 755
Chapter 34 Configuring IP Multicast Routing Monitoring and Maintaining IP Multicast Routing Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 34-36 78-17058-01...
MSDP can operate with if MBGP is not running. To use this feature, the switch must be running the metro IP access image. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS IP Note Command Reference, Volume 3 of 3: Multicast, Release 12.2.
Multicast traffic can now flow from the source across the source tree to the RP and then down the shared tree in the remote domain to the receiver. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-2...
This increases security because you can prevent your sources from being known outside your domain. Domains with only receivers can receive data without globally advertising group membership. • Global source multicast routing table state is not required, saving memory. • Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-3 78-17058-01...
The ISP probably uses a prefix list to define which prefixes it accepts from the customer’s router. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-4...
Page 760
SA messages. If that peer fails, the next configured default peer accepts all SA messages. This syntax is typically used at a stub site. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-5 78-17058-01...
This delay is known as join latency. If you want to sacrifice some memory in exchange for reducing the latency of the source information, you can configure the switch to cache SA messages. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-6 78-17058-01...
Page 762
This example shows how to enable the cache state for all sources in 171.69.0.0/16 sending to groups 224.2.0.0/16: Switch(config)# ip msdp cache-sa-state 100 Switch(config)# access-list 100 permit ip 171.69.0.0 0.0.255.255 224.2.0.0 0.0.255.255 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-7 78-17058-01...
Receivers of source information (based on knowing the requestor) • For more information, see the “Redistributing Sources” section on page 35-9 and the “Filtering Source-Active Request Messages” section on page 35-11. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-8 78-17058-01...
1 to 199. This access list number must also be configured in the ip as-path access-list command. The switch advertises (S,G) pairs according to the access list or autonomous system path access list. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-9 78-17058-01...
Page 765
Verify your entries. Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. To remove the filter, use the no ip msdp redistribute global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-10 78-17058-01...
171.69.2.2. SA request messages from sources on network 192.4.22.0 pass access list 1 and are accepted; all others are ignored. Switch(config)# ip msdp filter sa-request 171.69.2.2 list 1 Switch(config)# access-list 1 permit 192.4.22.0 0.0.0.255 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-11 78-17058-01...
If all match criteria are true, a permit from the route map passes routes through the filter. A deny filters routes. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-12 78-17058-01...
Page 768
Switch(config)# ip msdp peer switch.cisco.com connect-source gigabitethernet0/1 Switch(config)# ip msdp sa-filter out switch.cisco.com list 100 Switch(config)# access-list 100 permit ip 171.69.0.0 0.0.255.255 224.20 0 0.0.255.255 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-13 78-17058-01...
Filter all incoming SA messages from an MSDP peer • Specify an IP extended access list to pass certain source/group pairs • Filter based on match criteria in a route map Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-14 78-17058-01...
Page 770
To remove the filter, use the no ip msdp sa-filter in {ip-address | name} [list access-list-number] [route-map map-tag] global configuration command. This example shows how to filter all SA messages from the peer named switch.cisco.com: Switch(config)# ip msdp peer switch.cisco.com connect-source gigabitethernet0/1 Switch(config)# ip msdp sa-filter in switch.cisco.com...
When a peer is shut down, the TCP connection is terminated and is not restarted. You can also shut down an MSDP session without losing configuration information for the peer. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-16 78-17058-01...
Configure which (S,G) entries from the multicast routing table are access-list-name] [asn advertised in SA messages. aspath-access-list-number] [route-map For more information, see the “Redistributing Sources” section on map] page 35-9. Step 4 Return to privileged EXEC mode. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-17 78-17058-01...
RP. To prevent the RP address from being derived in this way, use the no ip msdp originator-id interface-id global configuration command. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-18 78-17058-01...
[group-address | name] Clears the SA cache entries for all entries, all sources for a specific group, or all entries for a specific source/group pair. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 35-19 78-17058-01...
C H A P T E R Troubleshooting This chapter describes how to identify and resolve software problems related to the Cisco IOS software on the Cisco ME 3400 switch. You can use the command-line interface (CLI) to identify and solve problems.
From your PC, download the software image tar file (image_filename.tar) from Cisco.com . The Cisco IOS image is stored as a bin file in a directory in the tar file. For information about locating the software image files on Cisco.com, see the release notes Step 2 Extract the bin file from the tar file.
Disabling password recovery provides configuration file security by preventing unauthorized users from accessing the configuration file. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 36-3 78-17058-01...
Page 779
Chapter 36 Troubleshooting Recovering from a Lost or Forgotten Password The Cisco ME switch boot loader uses break-key detection to stop the automatic boot sequence for the password recovery purpose. Note The break key character is different for each operating system.
Boot the system: Step 6 switch: boot You are prompted to start the setup program. Enter N at the prompt: Continue with the configuration dialog? [yes/no]: N Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 36-5 78-17058-01...
Page 781
VLAN ID of the shutdown interface. With the switch in interface configuration mode, enter the no shutdown command. Reload the switch: Step 14 Switch# reload Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 36-6 78-17058-01...
You are prompted to start the setup program. To continue with password recovery, enter N at the prompt: Continue with the configuration dialog? [yes/no]: N Step 5 At the switch prompt, enter privileged EXEC mode: Switch> enable Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 36-7 78-17058-01...
If a remote device does not autonegotiate, configure the duplex settings on the two ports to match. The Note speed parameter can adjust itself even if the connected port does not autonegotiate. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 36-8 78-17058-01...
If you are using a non-Cisco SFP module, remove the SFP module from the switch, and replace it with a Cisco module. After inserting a Cisco SFP module, use the errdisable recovery cause gbic-invalid global configuration command to verify the port status, and enter a time interval for recovering from the error-disabled state.
• Understanding Ping The Cisco ME switch supports IP ping, which you can use to test connectivity to remote hosts. Ping sends an echo request packet to an address and waits for a reply. The Cisco ME switch also provides the Control Plane Security feature, which by default drops ping response packets received on user network interfaces (UNIs).
Using Ping All Software Versions For all software images for the Cisco ME switch, you can use a Layer 3 service policy to enable pings from the switch to a host connected to a UNI. For a switch running the metro IP access image, IP routing is not enabled by default and does not have Note to be enabled to use a Layer 3 service policy.
The switch can only identify the path from the source device to the destination device. It cannot identify the path that a packet takes from source host to the source device or from the destination device to the destination host. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 36-13 78-17058-01...
Layer 2 Traceroute Usage Guidelines These are the Layer 2 traceroute usage guidelines: • Cisco Discovery Protocol (CDP) must be enabled on all the devices in the network. For Layer 2 traceroute to function properly, do not disable CDP. Note CDP is available only on NNIs.
When a host receives a datagram destined to itself containing a destination port number that is unused locally, it sends an ICMP Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 36-15...
The probe timed out. Unknown packet type. Administratively unreachable. Usually, this output means that an access list is blocking traffic. Host unreachable. Network unreachable. Protocol unreachable. Source quench. Port unreachable. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 36-16 78-17058-01...
TDR, a local device sends a signal through a cable and compares the reflected signal to the initial signal. TDR is supported only on the copper Ethernet 10/100 ports on the Cisco ME switch. TDR can detect these cabling problems: •...
For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. It is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Most of the information in the output from the command is useful mainly for technical support personnel, who have access to detailed information about the switch ASICs. However, packet forwarding information can also be helpful in troubleshooting. Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 36-19 78-17058-01...
Cisco IOS image to fail (crash). The switch writes the crash information to the console at the time of the failure, and the file is created the next time you boot the Cisco IOS image after the failure (instead of while the system is failing).
• CISCO-ENTITY-VENDORTYPE-OID-MIB CISCO-ENVMON-MIB • • CISCO-ETHERNET-ACCESS-MIB CISCO-FLASH-MIB (Flash memory on all switches is modeled as removable flash memory.) • • CISCO-FTP-CLIENT-MIB CISCO-HSRP-MIB • Layer 3 MIBs are available only when the metro IP access image is running on the switch.
• • TCP-MIB • UDP-MIB You can also use this URL for a list of supported MIBs for the Cisco ME switch: Note ftp://nm-tac.cisco.com/pub/mib_repo/ You can access other information about MIBs and Cisco products on the Cisco web site: http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml...
Page 801
Appendix A Supported MIBs Using FTP to Access the MIB Files Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Working with the Cisco IOS File System, Configuration Files, and Software Images This appendix describes how to manipulate the Cisco ME 3400 Ethernet Access switch flash file system, how to copy configuration files, and how to archive (upload and download) software images to a switch.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Displaying Available File Systems To display the available file systems on your switch, use the show file systems privileged EXEC command as shown in this example.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Setting the Default File System You can specify the file system or directory that the system uses as the default file system by using the cd filesystem: privileged EXEC command.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Creating and Removing Directories Beginning in privileged EXEC mode, follow these steps to create and remove a directory: Command Purpose...
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Some invalid combinations of source and destination exist. Specifically, you cannot copy these combinations: • From a running configuration to a running configuration •...
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Creating a tar File To create a tar file and write files into it, use this privileged EXEC command: archive tar /create destination-url flash:/file-url For destination-url, specify the destination URL alias for the local or network file system and the name of the tar file to create.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System This example shows how to display the contents of a switch tar file that is in flash memory: Switch# archive tar /table flash:me340x-metrobase-tar.122-25.EX.tar info (219 bytes) me340x-metrobase-mz.122-25.EX/ (directory)
This section describes how to create, load, and maintain configuration files. Configuration files contain commands entered to customize the function of the Cisco IOS software. A way to create a basic configuration file is to use the setup program or to enter the setup privileged EXEC command.
Page 810
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Note The copy {ftp: | rcp: | tftp:} system:running-config privileged EXEC command loads the configuration files on the switch as if you were entering the commands at the command line. The switch does not erase the existing running configuration before adding the commands.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Copying Configuration Files By Using TFTP You can configure the switch by using configuration files you create, download from another switch, or download from a TFTP server.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Step 3 Log into the switch through the console port or a Telnet session. Step 4 Download the configuration file from the TFTP server to configure the switch.
Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files When you copy a configuration file from the switch to a server by using FTP, the Cisco IOS software sends the first valid username in this list: •...
Page 814
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Downloading a Configuration File By Using FTP Beginning in privileged EXEC mode, follow these steps to download a configuration file by using FTP:...
Page 815
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Uploading a Configuration File By Using FTP Beginning in privileged EXEC mode, follow these steps to upload a configuration file by using FTP:...
The RCP requires a client to send a remote username with each RCP request to a server. When you copy a configuration file from the switch to a server, the Cisco IOS software sends the first valid username in this list: •...
Page 817
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files • When you upload a file to the RCP server, it must be properly configured to accept the RCP write request from the user on the switch. For UNIX systems, you must add an entry to the .rhosts file for the remote user on the RCP server.
Page 818
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files This example shows how to specify a remote username of netadmin1. Then it copies the configuration file host2-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101...
Depending on the setting of the file prompt global configuration command, you might be prompted for confirmation before you delete a file. By default, the switch prompts for confirmation on destructive file operations. For more information about the file prompt command, see the Cisco IOS Command Reference for Release 12.2.
Image Location on the Switch The Cisco IOS image is stored as a .bin file in a directory that shows the version number. A subdirectory contains the files needed for web management. The image is stored on the system board flash memory (flash:).
Cisco IOS image total_image_file_size Specifies the size of all the images (the Cisco IOS image and the web management files) in the tar file, which is an approximate measure of how much flash memory is required to hold them...
Page 822
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Preparing to Download or Upload an Image File By Using TFTP Before you begin downloading or uploading an image file by using TFTP, do these tasks: Ensure that the workstation acting as the TFTP server is properly configured.
Page 823
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command Purpose Step 3 archive download-sw /overwrite /reload Download the image file from the TFTP server to the switch, and tftp:[[//location]/directory]/image-name.tar overwrite the current image.
The archive upload-sw privileged EXEC command builds an image file on the server by uploading these files in order: info, the Cisco IOS image, and the web management files. After these files are uploaded, the upload algorithm creates the tar file format.
Page 825
The FTP protocol requires a client to send a remote username and password on each FTP request to a server. When you copy an image file from the switch to a server by using FTP, the Cisco IOS software sends the first valid username in this list: The username specified in the archive download-sw or archive upload-sw privileged EXEC •...
Page 826
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Downloading an Image File By Using FTP You can download a new image file and overwrite the current image or keep the current image.
Page 827
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command Purpose Step 8 archive download-sw /leave-old-sw /reload Download the image file from the FTP server to the switch, ftp:[[//username[:password]@location]/directory] and keep the current image.
The archive upload-sw command builds an image file on the server by uploading these files in order: info, the Cisco IOS image, and the web management files. After these files are uploaded, the upload algorithm creates the tar file format.
RCP requires a client to send a remote username on each RCP request to a server. When you copy an image from the switch to a server by using RCP, the Cisco IOS software sends the first valid username in this list: •...
Page 830
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Before you begin downloading or uploading an image file by using RCP, do these tasks: • Ensure that the workstation acting as the RCP server supports the remote shell (rsh).
Page 831
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command Purpose Step 6 archive download-sw /overwrite /reload Download the image file from the RCP server to the switch, rcp:[[[//[username@]location]/directory]/image-na and overwrite the current image.
Page 832
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images The algorithm installs the downloaded image onto the system board flash device (flash:). The image is placed into a new directory named with the software version string, and the BOOT environment variable is updated to point to the newly installed image.
Page 833
The archive upload-sw privileged EXEC command builds an image file on the server by uploading these files in order: info, the Cisco IOS image, and the web management files. After these files are uploaded, the upload algorithm creates the tar file format.
This appendix lists some of the command-line interface (CLI) commands that appear when you enter the question mark (?) at the Cisco Metro Ethernet (ME) 3400 Ethernet Access switch prompt but are not supported in this release, either because they are not tested or because of switch hardware limitations.
CPU. If the route is hardware-switched, the command has no effect because the CPU does not receive the packet and cannot display it. show ip pim vc [group-address | name] [type number] show ip rtp header-compression [type number] [detail] Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Unsupported Privileged EXEC or User EXEC Commands clear ip accounting [checkpoint] clear ip bgp address flap-statistics clear ip bgp prefix-list debug ip cef stats show cef [drop | not-cef-switched] show ip accounting [checkpoint] [output-packets | access-violations] Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
Unsupported Interface Configuration Commands ip accounting ip load-sharing [per-packet] ip mtu bytes ip verify ip unnumbered type number All ip security commands Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
[interface-id..] set ip default next-hop ip-address [ip-address..] set ip destination ip-address mask set ip precedence value set ip qos-group set metric-type internal set origin set metric-type internal set tag tag-value Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
| name [prefix-list list] (Because BGP/MBGP is not supported, use the ip msdp peer command instead of this command.) NetFlow Commands Unsupported Global Configuration Commands ip flow-aggregation cache ip flow-cache entries ip flow-export Cisco ME 3400 Ethernet Access Switch Software Configuration Guide 78-17058-01...
ACLs creating 28-7 ACEs 28-2 matching criteria 28-7 any keyword 28-12, 30-29 named 28-14 numbers 28-8 terminal lines, setting on 28-18 unsupported features 28-7 Layer 4 information in 28-37 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-1 78-17058-01...
Page 845
MSTP 15-21 default aging 14-9 for STP 14-21 defined 5-19 alarms, RMON 25-3 learning 5-20 allowed-VLAN list 11-17 removing 5-22 area border routers MAC, discovering 5-28 See ABRs Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-2 78-17058-01...
Page 846
32-54 with TACACS+ 7-11, 7-16 CIDR 32-54 authorized ports with 802.1x clear commands 32-58 autoconfiguration community filtering 32-51 configuring neighbors 32-53 default configuration 32-40 described 32-39 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-3 78-17058-01...
Page 847
3-15 disabling for routing device 22-3 to 22-4 prompt 3-15 enabling and disabling trap-door mechanism on an interface 22-4 bootstrap router (BSR), described 34-5 on a switch 22-3 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-4 78-17058-01...
Page 848
See CIDR described classless routing 32-6 enabling automated configuration class map enabling configuration agent match-all option enabling event agent 30-7 match-any option command-line interface 30-7 class-map command 30-3 See CLI Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-5 78-17058-01...
Page 851
DHCP snooping binding database for IP address information adding bindings 18-12 for receiving the configuration file binding entries, displaying 18-13 overview binding file relationship to BOOTP format 18-6 location 18-5 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-8 78-17058-01...
Page 852
DUAL finite state machine, EIGRP 32-33 default configuration 5-16 duplex mode, configuring 9-15 displaying the configuration 5-17 dynamic access ports overview characteristics 5-15 11-5 setting up configuring 5-16 11-26 support for defined Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-9 78-17058-01...
Page 853
19-3 enable password priority of ARP ACLs and DHCP snooping entries 19-4 enable secret password encryption for passwords Enhanced IGRP See EIGRP Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-10 78-17058-01...
Page 854
31-7, 31-16 11-1 logical interfaces, described 31-3 extended system ID MSTP 15-14 14-4, 14-14 Extensible Authentication Protocol over LAN external BGP See EBGP external neighbors, BGP 32-42 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-11 78-17058-01...
Page 855
Layer 3 interfaces 9-20 configuring 17-3 hello time default configuration 17-2 MSTP 15-19 description 17-1 14-20 monitoring 17-4 help, for the command line flooded traffic, blocking 21-7 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-12 78-17058-01...
Page 856
34-25 traceroute and 36-15 statically connected member 34-30 unreachable messages 28-19 controlling access to groups 34-26 unreachables and ACLs 28-21 default configuration 34-25 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-13 78-17058-01...
Page 857
20-23 configuration guidelines 30-36 default configuration 20-23 configuring 30-36 described initial configuration 20-22 monitoring defaults 20-28 support for See also getting started and hardware installation guides Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-14 78-17058-01...
Page 858
9-10 IP multicast routing interface types addresses all-hosts 34-2 all-multicast-routers 34-2 Interior Gateway Protocol host group address range 34-2 See IGP administratively-scoped boundaries, described 34-32 and IGMP snooping 20-1 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-15 78-17058-01...
Page 859
34-10 See also PIM group-to-RP mappings IP packets, classification 30-5 Auto-RP 34-4 IP precedence 34-5 classification 30-8 values 30-5 IP protocols in ACLs 28-11 routing IP routes, monitoring 32-83 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-16 78-17058-01...
Page 860
MAC address and IP address 32-7 adding 18-15 passive interfaces 32-79 deleting protocols 18-16 IP traceroute distance-vector 32-2 executing 36-16 dynamic 32-2 overview link-state 36-15 32-3 proxy ARP 32-8 redistribution 32-73 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-17 78-17058-01...
Page 861
20-3 30-5 Layer 2 protocol tunneling configuring 13-10 configuring for EtherChannels 13-14 default configuration 13-11 defined 13-8 described 7-32 guidelines 13-11 See also Kerberos layer-2 template keepalive messages 14-3 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-18 78-17058-01...
Page 862
Layer 2 interfaces 28-28 with TACACS+ 7-14 configuring for QoS 30-30 login banners 5-17 creating 28-26 log messages defined 28-26 See system message logging macros See Smartports macros manageability features Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-19 78-17058-01...
Page 863
SNMP interaction with 27-4 30-55 supported RP mapping information 34-21 mirroring traffic for analysis SFP status 24-1 1-8, 9-23, 36-9 mismatches, autonegotiation source-active messages 36-8 35-19 speed and duplex mode 9-16 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-20 78-17058-01...
Page 864
15-19 peer-RPF flooding link type for rapid convergence 35-2 15-22 maximum aging time 15-21 maximum hop count 15-21 MST region 15-13 path cost 15-18 port priority 15-17 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-21 78-17058-01...
Page 865
See MVR CIST Multiple HSRP 15-3 configuring 15-13 See MHSRP described 15-2 multiple VPN routing/forwarding in customer edge devices hop-count mechanism 15-4 See multi-VRF CE 15-2 supported spanning-tree instances 15-2 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-22 78-17058-01...
Page 866
11-19 creating an access group default 11-19 disabling NTP services per interface 5-10 neighbor discovery/recovery, EIGRP 32-33 source IP address, configuring 5-10 neighbors, BGP 32-53 stratum support for Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-23 78-17058-01...
Page 868
8-17 policers manual re-authentication of a client 8-14 configuring for more than one traffic class periodic re-authentication 30-39 8-13 described quiet period 30-2 8-14 RADIUS server 8-13 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-25 78-17058-01...
Page 869
VMPS 11-23 described preferential treatment of traffic port blocking 1-2, 21-7 See QoS port-channel prefix lists, BGP 32-50 See EtherChannel preventing unauthorized access primary links 17-1 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-26 78-17058-01...
Page 872
30-24 of interfaces QoS groups rapid convergence 15-7 classification 30-10 rapid per-VLAN spanning-tree plus described 30-5, 30-10 See rapid PVST+ QoS information, displaying 30-55 quality of service See QoS Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-29 78-17058-01...
Page 873
27-2 Remote Copy Protocol 2475, DSCP 30-9 See RCP 2597, AF per-hop behavior 30-9 Remote Network Monitoring 2598, EF 30-9 See RMON Remote SPAN See RSPAN remote SPAN 24-2 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-30 78-17058-01...
Page 875
30-41 described set-request operation 27-4 templates severity levels, defining in system messages 26-8 configuring SFPs number of monitoring status of 1-8, 9-23, 36-9 security and identification 36-9 status, displaying Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-32 78-17058-01...
Page 879
5-11 stub areas, OSPF 32-27 summer time 5-13 subdomains, private VLAN time zones 12-1 5-12 subnet mask displaying the time and date 32-5 5-12 subnet zero 32-6 overview Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-36 78-17058-01...
Page 880
5-14 to 5-15 displaying the contents of system resources, optimizing extracting image file format B-19 Telnet accessing management interfaces number of connections setting a password Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-37 78-17058-01...
Page 881
36-14 26-1 multicast traffic 36-14 with traceroute 36-15 multiple devices on a port 36-14 trunking encapsulation unicast traffic trunk ports 36-13 usage guidelines configuring 36-14 11-17 defined 9-4, 11-4 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-38 78-17058-01...
Page 882
FTP B-14 link-detection mechanism 23-1 using RCP B-17 neighbor database 23-2 using TFTP B-11 overview 23-1 resetting an interface 23-6 status, displaying 23-6 support for UDP, configuring 32-14 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-39 78-17058-01...
Page 883
VLAN Management Policy Server illustrated 11-2 See VMPS internal 11-8 VLAN map entries, order of 28-30 limiting source traffic with RSPAN 24-21 limiting source traffic with SPAN 24-15 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-40 78-17058-01...
Page 884
11-27 configuring routing in 32-63 forwarding 32-61 in service provider networks 32-59 routes 1-14, 32-59 VPN routing and forwarding table See VRF 1-5, 11-23 defining 32-61 tables 1-14, 32-59 Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-41 78-17058-01...
Page 885
Index Cisco ME 3400 Ethernet Access Switch Software Configuration Guide IN-42 78-17058-01...