Sign In
Upload
Manuals
Brands
Cisco Manuals
Network Router
WS-C2960-24LC-S
Cisco WS-C2960-24LC-S Manuals
Manuals and User Guides for Cisco WS-C2960-24LC-S. We have
1
Cisco WS-C2960-24LC-S manual available for free PDF download: Software Configuration Manual
Cisco WS-C2960-24LC-S Software Configuration Manual (730 pages)
Software Guide
Brand:
Cisco
| Category:
Network Router
| Size: 7.9 MB
Table of Contents
Table of Contents
3
Related Publications
30
Features
33
Ease-Of-Deployment and Ease-Of-Use Features
33
Chapter 1 Overview
34
Performance Features
34
Management Options
35
Manageability Features
36
Availability and Redundancy Features
38
Security Features
39
VLAN Features
39
Qos and Cos Features
41
Default Settings after Initial Switch Configuration
42
Monitoring Features
42
Network Configuration Examples
44
Design Concepts for Using the Switch
44
Small to Medium-Sized Network Using Catalyst 2960 Switches
48
Long-Distance, High-Bandwidth Transport Configuration
49
Where to Go Next
50
Using the Command-Line Interface
51
CHAPTER 2 Using the Command-Line Interface
51
Understanding Command Modes
51
C H a P T E R 2 Using the Command-Line Interface
52
Understanding the Help System
53
Understanding Abbreviated Commands
54
Understanding no and Default Forms of Commands
54
Understanding CLI Error Messages
55
Using Configuration Logging
55
Using Command History
56
Changing the Command History Buffer Size
56
Recalling Commands
56
Disabling the Command History Feature
57
Using Editing Features
57
Editing Commands through Keystrokes
57
Enabling and Disabling Editing Features
57
Editing Command Lines that Wrap
59
Accessing the CLI
60
Accessing the CLI through a Console Connection or through Telnet
60
Searching and Filtering Output of Show and more Commands
60
Chapter 3 Assigning the Switch IP Address and Default Gateway
61
Understanding the Boot Process
61
Assigning Switch Information
62
Default Switch Information
63
Understanding DHCP-Based Autoconfiguration
63
DHCP Client Request Process
64
Configuring DHCP-Based Autoconfiguration
65
Configuring the TFTP Server
65
DHCP Server Configuration Guidelines
65
Configuring the DNS
66
Configuring the Relay Device
66
Obtaining Configuration Files
67
Example Configuration
68
Manually Assigning IP Information
70
Checking and Saving the Running Configuration
70
Modifying the Startup Configuration
71
Automatically Downloading a Configuration File
72
Default Boot Configuration
72
Specifying the Filename to Read and Write the System Configuration
72
Booting Manually
73
Booting a Specific Software Image
74
Controlling Environment Variables
74
Scheduling a Reload of the Software Image
76
Configuring a Scheduled Reload
76
Displaying Scheduled Reload Information
77
Chapter 4 Configuring Cisco IOS CNS Agents
79
Understanding Cisco Configuration Engine Software
79
Chapter 4 Configuring Cisco IO CN Agent
80
Configuration Service
80
Configid
81
Event Service
81
Namespace Mapper
81
What You Should Know about the CNS Ids and Device Hostnames
81
Deviceid
82
Hostname and Deviceid
82
Using Hostname, Deviceid, and Configid
82
Understanding Cisco IOS Agents
83
Initial Configuration
83
Incremental (Partial) Configuration
84
Synchronized Configuration
84
Configuring Cisco IOS Agents
84
Enabling Automated CNS Configuration
84
Enabling the CNS Event Agent
86
Enabling an Initial Configuration
87
Enabling the Cisco IOS CNS Agent
87
Enabling a Partial Configuration
89
Displaying CNS Configuration
90
Chapter 5 Clustering Switches
91
Understanding Switch Clusters
91
Candidate Switch and Cluster Member Switch Characteristics
93
Cluster Command Switch Characteristics
93
Standby Cluster Command Switch Characteristics
93
Planning a Switch Cluster
94
Automatic Discovery of Cluster Candidates and Members
94
Discovery through CDP Hops
95
Discovery through Different Vlans
96
Discovery through Non-CDP-Capable and Noncluster-Capable Devices
96
Discovery through Different Management Vlans
97
Discovery of Newly Installed Switches
98
HSRP and Standby Cluster Command Switches
99
Other Considerations for Cluster Standby Groups
100
Virtual IP Addresses
100
Automatic Recovery of Cluster Configuration
101
Hostnames
102
IP Addresses
102
Passwords
103
SNMP Community Strings
103
LRE Profiles
104
TACACS+ and RADIUS
104
Using the CLI to Manage Switch Clusters
104
Catalyst 1900 and Catalyst 2820 CLI Considerations
104
Using SNMP to Manage Switch Clusters
105
Managing the System Time and Date
107
Chapter 6 Administering the Switch
108
Understanding Network Time Protocol
108
Configuring NTP
109
Default Ntp Configuration
110
Configuring NTP Authentication
110
Configuring NTP Associations
111
Configuring NTP Broadcast Service
112
Configuring NTP Access Restrictions
114
Configuring the Source IP Address for NTP Packets
116
Configuring Time and Date Manually
117
Setting the System Clock
117
Displaying the Time and Date Configuration
118
Configuring the Time Zone
118
Configuring Summer Time (Daylight Saving Time)
119
Displaying the NTP Configuration
117
Configuring a System Name and Prompt
120
Default System Name and Prompt Configuration
121
Configuring a System Name
121
Understanding DNS
121
Default DNS Configuration
122
Setting up DNS
122
Table
122
Displaying the DNS Configuration
123
Creating a Banner
123
Default Banner Configuration
123
Configuring a Message-Of-The-Day Login Banner
124
Configuring a Login Banner
125
Managing the MAC Address Table
125
Building the Address Table
126
MAC Addresses and Vlans
126
Changing the Address Aging Time
127
Default MAC Address Table Configuration
127
Step 1
127
Step 1 Configure Terminal
127
Table
127
Configuring MAC Address Notification Traps
128
Removing Dynamic Address Entries
128
Adding and Removing Static Address Entries
130
Configuring Unicast MAC Address Filtering
131
Displaying Address Table Entries
132
Managing the ARP Table
132
Chapter 7 Configuring SDM Templates
133
Understanding the SDM Templates
133
Configuring the Switch SDM Template
134
Default SDM Template
134
SDM Template Configuration Guidelines
134
Setting the SDM Template
134
Displaying the SDM Templates
135
CHAPTER 8 Configuring Switch-Based Authentication
137
Preventing Unauthorized Access to Your Switch
137
C H a P T E R 8 Configuring Switch-Based Authentication
138
Protecting Access to Privileged EXEC Commands
138
Default Password and Privilege Level Configuration
138
Protecting Enable and Enable Secret Passwords with Encryption
139
Setting or Changing a Static Enable Password
139
Disabling Password Recovery
141
Configuring Username and Password Pairs
142
Setting a Telnet Password for a Terminal Line
142
Configuring Multiple Privilege Levels
143
Setting the Privilege Level for a Command
144
Changing the Default Privilege Level for Lines
145
Logging into and Exiting a Privilege Level
145
Controlling Switch Access with TACACS
146
Understanding TACACS
146
Configuring TACACS
148
TACACS+ Operation
148
Default TACACS+ Configuration
149
Identifying the TACACS+ Server Host and Setting the Authentication Key
149
Configuring TACACS+ Login Authentication
150
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
152
Displaying the TACACS+ Configuration
153
Starting TACACS+ Accounting
153
Controlling Switch Access with RADIUS
153
Understanding RADIUS
154
Configuring RADIUS
155
RADIUS Operation
155
Default Radius Configuration
156
Identifying the RADIUS Server Host
156
Configuring RADIUS Login Authentication
159
Defining AAA Server Groups
161
Configuring RADIUS Authorization for User Privileged Access and Network Services
163
Starting RADIUS Accounting
164
Configuring Settings for All RADIUS Servers
165
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
165
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
167
Displaying the RADIUS Configuration
167
Configuring the Switch for Local Authentication and Authorization
168
Configuring the Switch for Secure Shell
169
SSH Servers, Integrated Clients, and Supported Versions
169
Understanding SSH
169
Configuration Guidelines
170
Configuring SSH
170
Limitations
170
Setting up the Switch to Run SSH
171
Configuring the SSH Server
172
Displaying the SSH Configuration and Status
173
Configuring the Switch for Secure Socket Layer HTTP
173
Understanding Secure HTTP Servers and Clients
173
Certificate Authority Trustpoints
174
Ciphersuites
175
Configuring a CA Trustpoint
176
Configuring Secure HTTP Servers and Clients
176
Default SSL Configuration
176
SSL Configuration Guidelines
176
Configuring the Secure HTTP Server
177
Configuring the Secure HTTP Client
179
Displaying Secure HTTP Server and Client Status
179
Configuring the Switch for Secure Copy Protocol
179
Information about Secure Copy
180
CHAPTER 9 Configuring IEEE 802.1X Port-Based Authentication
181
Understanding IEEE 802.1X Port-Based Authentication
181
Device Roles
182
C H a P T E R 9 Configuring IEEE 802.1X Port-Based Authentication
182
Authentication Process
183
Authentication Initiation and Message Exchange
185
IEEE 802.1X Host Mode
187
Ports in Authorized and Unauthorized States
187
IEEE 802.1X Accounting
188
IEEE 802.1X Accounting Attribute-Value Pairs
188
Using IEEE 802.1X Authentication with VLAN Assignment
189
Using IEEE 802.1X Authentication with Guest VLAN
191
Using IEEE 802.1X Authentication with Restricted VLAN
192
Using IEEE 802.1X Authentication with Inaccessible Authentication Bypass
193
Using IEEE 802.1X Authentication with Port Security
194
Using IEEE 802.1X Authentication with Voice VLAN Ports
194
Using IEEE 802.1X Authentication with Wake-On-LAN
195
Using IEEE 802.1X Authentication with MAC Authentication Bypass
196
Using Network Admission Control Layer 2 IEEE 802.1X Validation
197
Using Web Authentication
197
Configuring Ieee 802.1X Authentication
198
Web Authentication with Automatic MAC Check
198
Default IEEE 802.1X Authentication Configuration
199
IEEE 802.1X Authentication Configuration Guidelines
200
IEEE 802.1X Authentication
200
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
201
MAC Authentication Bypass
202
Configuring IEEE 802.1X Authentication
202
Upgrading from a Previous Software Release
202
Configuring the Switch-To-RADIUS-Server Communication
204
Configuring Periodic Re-Authentication
205
Configuring the Host Mode
205
Changing the Quiet Period
206
Configuring Periodic Re-Authentication
206
Manually Re-Authenticating a Client Connected to a Port
206
Changing the Switch-To-Client Retransmission Time
207
Setting the Re-Authentication Number
208
Setting the Switch-To-Client Frame-Retransmission Number
208
Configuring IEEE 802.1X Accounting
209
Configuring a Guest VLAN
210
Configuring a Restricted VLAN
211
Configuring the Inaccessible Authentication Bypass Feature
213
Configuring IEEE 802.1X Authentication with Wol
215
Configuring MAC Authentication Bypass
216
Configuring NAC Layer 2 IEEE 802.1X Validation
217
Configuring Web Authentication
218
Disabling IEEE 802.1X Authentication on the Port
220
Displaying IEEE 802.1X Statistics and Status
221
Resetting the IEEE 802.1X Authentication Configuration to the Default Values
221
CHAPTER 10 Configuring Interface Characteristics
223
Understanding Interface Types
223
Access Ports
224
C H a P T E R 10 Configuring Interface Characteristics
224
Port-Based Vlans
224
Switch Ports
224
Etherchannel Port Groups
225
Trunk Ports
225
Connecting Interfaces
226
Dual-Purpose Uplink Ports
226
Using Interface Configuration Mode
226
Procedures for Configuring Interfaces
227
Configuring a Range of Interfaces
228
Configuring and Using Interface Range Macros
229
Configuring Ethernet Interfaces
231
Default Ethernet Interface Configuration
231
Setting the Type of a Dual-Purpose Uplink Port
232
Configuring Interface Speed and Duplex Mode
234
Speed and Duplex Configuration Guidelines
234
Setting the Interface Speed and Duplex Parameters
235
Configuring IEEE 802.3X Flow Control
236
Configuring Auto-MDIX on an Interface
237
Adding a Description for an Interface
238
Configuring the System MTU
238
Monitoring and Maintaining the Interfaces
240
Monitoring Interface Status
240
Clearing and Resetting Interfaces and Counters
241
Shutting down and Restarting the Interface
241
Chapter 11 Configuring Smartports Macros
243
Understanding Smartports Macros
243
Configuring Smartports Macros
244
Default Smartports Macro Configuration
244
Smartports Macro Configuration Guidelines
244
Creating Smartports Macros
246
Applying Smartports Macros
247
Applying Cisco-Default Smartports Macros
248
Displaying Smartports Macros
250
Chapter 12 Configuring Vlans
251
Understanding Vlans
251
Supported Vlans
252
VLAN Port Membership Modes
253
Configuring Normal-Range Vlans
254
Normal-Range VLAN Configuration Guidelines
255
Token Ring Vlans
255
Saving VLAN Configuration
256
VLAN Configuration in Config-Vlan Mode
256
VLAN Configuration in VLAN Database Configuration Mode
256
VLAN Configuration Mode Options
256
Default Ethernet VLAN Configuration
257
Creating or Modifying an Ethernet VLAN
258
Deleting a VLAN
259
Assigning Static-Access Ports to a VLAN
260
Configuring Extended-Range Vlans
261
Default VLAN Configuration
261
Creating an Extended-Range VLAN
262
Extended-Range VLAN Configuration Guidelines
262
Displaying Vlans
263
Configuring VLAN Trunks
264
Trunking Overview
264
IEEE 802.1Q Configuration Considerations
265
Configuring an Ethernet Interface as a Trunk Port
266
Default Layer 2 Ethernet Interface VLAN Configuration
266
Interaction with Other Features
266
Configuring a Trunk Port
267
Defining the Allowed Vlans on a Trunk
268
Changing the Pruning-Eligible List
269
Configuring the Native VLAN for Untagged Traffic
269
Configuring Trunk Ports for Load Sharing
270
Load Sharing Using STP Port Priorities
270
Load Sharing Using STP Path Cost
272
Configuring VMPS
273
Dynamic-Access Port VLAN Membership
274
Understanding VMPS
274
Configuring the VMPS Client
275
Default VMPS Client Configuration
275
VMPS Configuration Guidelines
275
Configuring Dynamic-Access Ports on VMPS Clients
276
Entering the IP Address of the VMPS
276
Changing the Reconfirmation Interval
277
Reconfirming VLAN Memberships
277
Changing the Retry Count
278
Monitoring the VMPS
278
Troubleshooting Dynamic-Access Port VLAN Membership
279
VMPS Configuration Example
279
Configuring VTP
281
Understanding VTP
281
Chapter 13 Configuring VTP
282
The VTP Domain
282
VTP Advertisements
283
VTP Modes
283
Configuring VTP
284
VTP Pruning
284
VTP Version 2
284
Configuring Vtp
286
Default VTP Configuration
286
VTP Configuration Options
287
VTP Configuration in Global Configuration Mode
287
VTP Configuration in VLAN Database Configuration Mode
287
VTP Configuration Guidelines
288
Domain Names
288
Passwords
288
VTP Version
288
Configuration Requirements
289
Configuring a VTP Server
289
Configuring a VTP Client
291
Disabling VTP (VTP Transparent Mode)
292
Enabling VTP Version 2
293
Adding a VTP Client Switch to a VTP Domain
294
Enabling VTP Pruning
294
Monitoring VTP
296
Chapter 14 Configuring Voice VLAN
297
Understanding Voice VLAN
297
Cisco IP Phone Data Traffic
298
Cisco IP Phone Voice Traffic
298
Configuring Voice VLAN
299
Default Voice VLAN Configuration
299
Voice VLAN Configuration Guidelines
299
Configuring a Port Connected to a Cisco 7960 IP Phone
300
Configuring Cisco IP Phone Voice Traffic
300
Configuring the Priority of Incoming Data Frames
302
Displaying Voice VLAN
302
Configuring STP
304
Understanding Spanning-Tree Features
304
Chapter 15 Configuring STP
304
STP Overview
304
Spanning-Tree Topology and Bpdus
305
Bridge ID, Switch Priority, and Extended System ID
306
Spanning-Tree Interface States
306
Blocking State
308
Forwarding State
308
Learning State
308
Listening State
308
Disabled State
309
How a Switch or Port Becomes the Root Switch or Root Port
309
Accelerated Aging to Retain Connectivity
310
Spanning Tree and Redundant Connectivity
310
Spanning-Tree Address Management
310
Spanning-Tree Modes and Protocols
311
Supported Spanning-Tree Instances
311
Configuring Spanning-Tree Features
312
Default Spanning-Tree Configuration
313
Spanning-Tree Configuration Guidelines
314
Changing the Spanning-Tree Mode
315
Configuring the Root Switch
316
Disabling Spanning Tree
316
Configuring a Secondary Root Switch
318
Configuring Port Priority
318
Configuring Path Cost
320
Configuring the Switch Priority of a VLAN
321
Configuring Spanning-Tree Timers
322
Configuring the Hello Time
322
Configuring the Forwarding-Delay Time for a VLAN
323
Configuring the Maximum-Aging Time for a VLAN
323
Configuring the Transmit Hold-Count
324
Spanning-Tree Interoperability and Backward Compatibility
312
STP and IEEE 802.1Q Trunks
312
Displaying the Spanning-Tree Status
324
Chapter 16 Configuring MSTP
325
Understanding MSTP
326
Multiple Spanning-Tree Regions
326
IST, CIST, and CST
327
Operations Within an MST Region
327
Operations between MST Regions
328
Hop Count
329
IEEE 802.1S Terminology
329
Boundary Ports
330
IEEE 802.1S Implementation
330
Interoperation between Legacy and Standard Switches
331
Port Role Naming Change
331
Detecting Unidirectional Link Failure
332
Interoperability with IEEE 802.1D STP
332
Understanding RSTP
332
Port Roles and the Active Topology
333
Rapid Convergence
334
Synchronization of Port Roles
335
Bridge Protocol Data Unit Format and Processing
336
Processing Inferior BPDU Information
337
Processing Superior BPDU Information
337
Topology Changes
337
Configuring MSTP Features
338
Default MSTP Configuration
338
MSTP Configuration Guidelines
339
Specifying the MST Region Configuration and Enabling MSTP
340
Configuring the Root Switch
341
Configuring a Secondary Root Switch
342
Configuring Port Priority
343
Configuring Path Cost
344
Configuring the Switch Priority
345
Configuring the Hello Time
346
Configuring the Forwarding-Delay Time
347
Configuring the Maximum-Aging Time
347
Configuring the Maximum-Hop Count
348
Specifying the Link Type to Ensure Rapid Transitions
348
Designating the Neighbor Type
349
Restarting the Protocol Migration Process
349
Displaying the MST Configuration and Status
350
CHAPTER 17 Configuring Optional Spanning-Tree Features
351
Understanding Optional Spanning-Tree Features
351
C H a P T E R 17 Configuring Optional Spanning-Tree Features
352
Understanding BPDU Guard
352
Understanding Port Fast
352
Understanding BPDU Filtering
353
Understanding Uplinkfast
353
Understanding Backbonefast
355
Understanding Etherchannel Guard
357
Understanding Root Guard
358
Understanding Loop Guard
359
Configuring Optional Spanning-Tree Features
359
Default Optional Spanning-Tree Configuration
359
Enabling Port Fast
360
Optional Spanning-Tree Configuration Guidelines
360
Enabling BPDU Guard
361
Enabling BPDU Filtering
362
Enabling Backbonefast
363
Enabling Uplinkfast for Use with Redundant Links
363
Enabling Etherchannel Guard
364
Enabling Loop Guard
365
Enabling Root Guard
365
Displaying the Spanning-Tree Status
366
Understanding IGMP Snooping
367
Chapter 18 Configuring IGMP Snooping and MVR
368
IGMP Versions
368
Joining a Multicast Group
369
IGMP Configurable-Leave Timer
371
Immediate Leave
371
Leaving a Multicast Group
371
Configuring IGMP Snooping
372
Default IGMP Snooping Configuration
372
Enabling or Disabling IGMP Snooping
373
Setting the Snooping Method
374
Configuring a Multicast Router Port
375
Configuring a Host Statically to Join a Group
376
Enabling IGMP Immediate Leave
376
Configuring the IGMP Leave Timer
377
Configuring TCN-Related Commands
378
Controlling the Multicast Flooding Time after a TCN Event
378
Recovering from Flood Mode
378
Disabling Multicast Flooding During a TCN Event
379
Configuring the IGMP Snooping Querier
380
Disabling IGMP Report Suppression
381
IGMP Report Suppression
372
Displaying IGMP Snooping Information
381
Understanding Multicast VLAN Registration
383
Using MVR in a Multicast Television Application
384
Configuring MVR
385
Default MVR Configuration
385
Configuring MVR Global Parameters
386
MVR Configuration Guidelines and Limitations
386
Configuring MVR Interfaces
387
Configuring IGMP Filtering and Throttling
389
Configuring IGMP Profiles
390
Default IGMP Filtering and Throttling Configuration
390
Applying IGMP Profiles
391
Setting the Maximum Number of IGMP Groups
392
Configuring the IGMP Throttling Action
393
Displaying MVR Information
389
Displaying IGMP Filtering and Throttling Configuration
394
CHAPTER 19 Configuring Port-Based Traffic Control
395
Configuring Storm Control
395
Understanding Storm Control
395
C H a P T E R 19 Configuring Port-Based Traffic Control
397
Configuring Storm Control and Threshold Levels
397
Default Storm Control Configuration
397
Configuring Protected Ports
399
Configuring a Protected Port
400
Default Protected Port Configuration
400
Protected Port Configuration Guidelines
400
Configuring Port Blocking
401
Blocking Flooded Traffic on an Interface
401
Default Port Blocking Configuration
401
Configuring Port Security
402
Secure MAC Addresses
402
Understanding Port Security
402
Security Violations
403
Default Port Security Configuration
404
Port Security Configuration Guidelines
404
Enabling and Configuring Port Security
405
Enabling and Configuring Port Security Aging
410
Displaying Port-Based Traffic Control Settings
411
Chapter 20 Configuring CDP
413
Understanding CDP
413
Configuring CDP
414
Configuring the CDP Characteristics
414
Default CDP Configuration
414
Disabling and Enabling CDP
415
Disabling and Enabling CDP on an Interface
416
Monitoring and Maintaining CDP
416
Chapter 21 Configuring LLDP and LLDP-MED
419
Understanding LLDP and LLDP-MED
419
Understanding LLDP
419
Understanding LLDP-MED
420
Configuring LLDP and LLDP-MED
421
Default LLDP Configuration
421
Configuring LLDP Characteristics
422
Disabling and Enabling LLDP Globally
423
Disabling and Enabling LLDP on an Interface
423
Configuring LLDP-MED Tlvs
424
Monitoring and Maintaining LLDP and LLDP-MED
425
Chapter 22 Configuring UDLD
427
Understanding UDLD
427
Modes of Operation
427
Methods to Detect Unidirectional Links
428
Configuring UDLD
430
Configuration Guidelines
430
Default UDLD Configuration
430
Enabling UDLD Globally
431
Enabling UDLD on an Interface
431
Resetting an Interface Disabled by UDLD
432
Displaying UDLD Status
432
Chapter 23 Configuring SPAN and RSPAN
433
Understanding SPAN and RSPAN
433
Local SPAN
434
Remote SPAN
434
SPAN and RSPAN Concepts and Terminology
435
SPAN Sessions
435
Monitored Traffic
436
Source Ports
437
Destination Port
438
Source Vlans
438
VLAN Filtering
438
Rspan Vlan
439
SPAN and RSPAN Interaction with Other Features
440
Configuring SPAN and RSPAN
441
Configuring Local SPAN
441
Default SPAN and RSPAN Configuration
441
Creating a Local SPAN Session
442
SPAN Configuration Guidelines
442
Creating a Local SPAN Session and Configuring Incoming Traffic
445
Specifying Vlans to Filter
446
Configuring RSPAN
447
Configuring a VLAN as an RSPAN VLAN
448
RSPAN Configuration Guidelines
448
Creating an RSPAN Source Session
449
Creating an RSPAN Destination Session
451
Creating an RSPAN Destination Session and Configuring Incoming Traffic
452
Specifying Vlans to Filter
453
Displaying SPAN and RSPAN Status
454
Chapter 24 Configuring RMON
455
Understanding RMON
455
Configuring RMON
456
Configuring RMON Alarms and Events
457
Default RMON Configuration
457
Collecting Group Ethernet Statistics on an Interface
459
Collecting Group History Statistics on an Interface
459
Displaying RMON Status
460
Chapter 25 Configuring System Message Logging
461
Understanding System Message Logging
461
Configuring System Message Logging
462
System Log Message Format
462
Default System Message Logging Configuration
463
Disabling Message Logging
464
Setting the Message Display Destination Device
465
Synchronizing Log Messages
466
Enabling and Disabling Time Stamps on Log Messages
467
Defining the Message Severity Level
468
Enabling and Disabling Sequence Numbers in Log Messages
468
Enabling the Configuration-Change Logger
470
Limiting Syslog Messages Sent to the History Table and to SNMP
470
Configuring the UNIX System Logging Facility
472
Configuring UNIX Syslog Servers
472
Logging Messages to a UNIX Syslog Daemon
472
Displaying the Logging Configuration
473
Chapter 26 Configuring SNMP
475
Understanding SNMP
475
SNMP Versions
476
SNMP Manager Functions
477
SNMP Agent Functions
478
SNMP Community Strings
478
Using SNMP to Access MIB Variables
478
SNMP Notifications
479
Configuring SNMP
480
SNMP Ifindex MIB Object Values
480
Default SNMP Configuration
481
SNMP Configuration Guidelines
481
Configuring Community Strings
482
Disabling the SNMP Agent
482
Configuring SNMP Groups and Users
484
Configuring SNMP Notifications
486
Setting the Agent Contact and Location Information
489
Limiting TFTP Servers Used through SNMP
490
SNMP Examples
491
Displaying SNMP Status
492
Chapter 27 Configuring Cisco IOS IP Slas Operations
493
Understanding Cisco IOS IP Slas
493
Using Cisco IOS IP Slas to Measure Network Performance
494
IP Slas Responder and IP Slas Control Protocol
495
Response Time Computation for IP Slas
496
Configuring IP Slas Operations
497
Configuration Guidelines
497
Default Configuration
497
Configuring the IP Slas Responder
498
Monitoring IP Slas Operations
499
Chapter 28 Configuring Qos
501
Understanding Qos
501
Basic Qos Model
503
Classification
505
Classification Based on Class Maps and Policy Maps
507
Classification Based on Qos Acls
507
Policing and Marking
508
Policing on Physical Ports
509
Mapping Tables
511
Queueing and Scheduling Overview
512
Weighted Tail Drop
512
SRR Shaping and Sharing
513
Queueing and Scheduling on Ingress Queues
514
Queueing and Scheduling on Egress Queues
516
Packet Modification
518
Configuring Auto-Qos
519
Generated Auto-Qos Configuration
520
Effects of Auto-Qos on the Configuration
524
Auto-Qos Configuration Guidelines
525
Enabling Auto-Qos for Voip
525
Auto-Qos Configuration Example
527
Configuring Standard Qos
529
Default Ingress Queue Configuration
530
Default Standard Qos Configuration
530
Default Egress Queue Configuration
531
Default Mapping Table Configuration
532
Policing Guidelines
532
Qos ACL Guidelines
532
Standard Qos Configuration Guidelines
532
Enabling Qos Globally
533
General Qos Guidelines
533
Configuring Classification Using Port Trust States
534
Configuring the Trust State on Ports Within the Qos Domain
534
Configuring a Trusted Boundary to Ensure Port Security
536
Configuring the Cos Value for an Interface
536
Configuring the DSCP Trust State on a Port Bordering Another Qos Domain
538
Enabling DSCP Transparency Mode
538
Configuring a Qos Policy
540
Classifying Traffic by Using Acls
541
Classifying Traffic by Using Class Maps
544
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
546
Classifying, Policing, and Marking Traffic by Using Aggregate Policers
549
Configuring DSCP Maps
551
Configuring the Cos-To-DSCP Map
552
Configuring the IP-Precedence-To-DSCP Map
553
Configuring the Policed-DSCP Map
554
Configuring the DSCP-To-Cos Map
555
Configuring the DSCP-To-DSCP-Mutation Map
556
Configuring Ingress Queue Characteristics
557
Mapping DSCP or Cos Values to an Ingress Queue and Setting WTD Thresholds
558
Allocating Buffer Space between the Ingress Queues
559
Allocating Bandwidth between the Ingress Queues
560
Configuring the Ingress Priority Queue
561
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
562
Configuration Guidelines
562
Configuring Egress Queue Characteristics
562
Mapping DSCP or Cos Values to an Egress Queue and to a Threshold ID
565
Configuring SRR Shaped Weights on Egress Queues
566
Configuring SRR Shared Weights on Egress Queues
567
Configuring the Egress Expedite Queue
568
Limiting the Bandwidth on an Egress Interface
568
Displaying Auto-Qos Information
529
Displaying Standard Qos Information
569
Chapter 29 Configuring Ipv6 Host Functions
571
Understanding Ipv6
571
Ipv6 Addresses
572
128-Bit Wide Unicast Addresses
573
Supported Ipv6 Unicast Routing Features
573
DNS for Ipv6
574
Icmpv6
574
Ipv6 Stateless Autoconfiguration and Duplicate Address Detection
574
Neighbor Discovery
574
Dual Ipv4 and Ipv6 Protocol Stacks
575
Ipv6 Applications
575
SDM Templates
576
Dual Ipv4-And-Ipv6 SDM Templates
577
Configuring Ipv6
577
Configuring Ipv6 ICMP Rate Limiting
578
Default Ipv6 Configuration
578
Configuring Static Routes for Ipv6
579
Displaying Ipv6
581
Chapter 30 Configuring Ipv6 MLD Snooping
585
Understanding MLD Snooping
585
MLD Messages
586
MLD Queries
587
Multicast Client Aging Robustness
587
Multicast Router Discovery
587
MLD Done Messages and Immediate-Leave
588
MLD Reports
588
Topology Change Notification Processing
589
Configuring Ipv6 MLD Snooping
589
Default MLD Snooping Configuration
589
Enabling or Disabling MLD Snooping
590
MLD Snooping Configuration Guidelines
590
Configuring a Multicast Router Port
592
Configuring a Static Multicast Group
592
Enabling MLD Immediate Leave
593
Configuring MLD Snooping Queries
594
Disabling MLD Listener Message Suppression
595
Displaying MLD Snooping Information
595
Chapter 31 Configuring Etherchannels and Link-State Tracking
597
Understanding Etherchannels
597
Etherchannel Overview
598
Port-Channel Interfaces
599
Pagp Modes
600
Port Aggregation Protocol
600
LACP Modes
601
Link Aggregation Control Protocol
601
Pagp Interaction with Other Features
601
Etherchannel on Mode
602
LACP Interaction with Other Features
602
Load Balancing and Forwarding Methods
602
Configuring Etherchannels
604
Default Etherchannel Configuration
605
Etherchannel Configuration Guidelines
605
Configuring Layer 2 Etherchannels
606
Configuring Etherchannel Load Balancing
608
Configuring the Pagp Learn Method and Priority
609
Configuring LACP Hot-Standby Ports
610
Configuring the LACP Port Priority
611
Configuring the LACP System Priority
611
Displaying Etherchannel, Pagp, and LACP Status
612
Understanding Link-State Tracking
613
Configuring Link-State Tracking
615
Configuring Link-State Tracking
616
Default Link-State Tracking Configuration
616
Link-State Tracking Configuration Guidelines
616
Displaying Link-State Tracking Status
617
Chapter 32 Troubleshooting
619
Recovering from a Software Failure
620
Recovering from a Lost or Forgotten Password
621
Procedure with Password Recovery Enabled
622
Procedure with Password Recovery Disabled
624
Recovering from a Command Switch Failure
625
Replacing a Failed Command Switch with a Cluster Member
626
Replacing a Failed Command Switch with Another Switch
628
Recovering from Lost Cluster Member Connectivity
629
Preventing Autonegotiation Mismatches
629
SFP Module Security and Identification
630
Monitoring SFP Module Status
630
Using Ping
630
Executing Ping
631
Understanding Ping
631
Using Layer 2 Traceroute
632
Understanding Layer 2 Traceroute
632
Usage Guidelines
632
Displaying the Physical Path
633
Using IP Traceroute
633
Understanding IP Traceroute
633
Executing IP Traceroute
634
Using TDR
635
Understanding TDR
635
Running TDR and Displaying the Results
636
Using Debug Commands
636
Enabling Debugging on a Specific Feature
636
Enabling All-System Diagnostics
637
Redirecting Debug and Error Message Output
637
Using the Show Platform Forward Command
638
Using the Crashinfo Files
639
Basic Crashinfo Files
639
Extended Crashinfo Files
640
Appendix
641
Supported Mibs
641
MIB List
641
Appendix A Supported MIB
642
MIB List
642
Using FTP to Access the MIB Files
643
Using FTP to Access the MIB Files
644
Appendix
645
Working with the Cisco IOS File System, Configuration Files, and Software Images
645
Working with the Flash File System
645
Displaying Available File Systems
646
A P P E N D I X B Working with the Cisco IOS File System, Configuration Files, and Software Images
647
Changing Directories and Displaying the Working Directory
647
Displaying Information about Files on a File System
647
Setting the Default File System
647
Copying Files
648
Creating and Removing Directories
648
Creating, Displaying, and Extracting Tar Files
649
Deleting Files
649
Creating a Tar File
650
Displaying the Contents of a Tar File
650
Displaying the Contents of a File
651
Extracting a Tar File
651
Working with Configuration Files
652
Guidelines for Creating and Using Configuration Files
652
Configuration File Types and Location
653
Creating a Configuration File by Using a Text Editor
653
Copying Configuration Files by Using TFTP
654
Preparing to Download or Upload a Configuration File B y Using TFTP
654
Downloading the Configuration File by Using TFTP
655
Uploading the Configuration File by Using TFTP
655
Copying Configuration Files by Using FTP
656
Downloading a Configuration File by Using FTP
656
Preparing to Download or Upload a Configuration File by Using FTP
656
Uploading a Configuration File by Using FTP
658
Copying Configuration Files by Using RCP
659
Preparing to Download or Upload a Configuration File by Using RCP
659
Downloading a Configuration File by Using RCP
660
Uploading a Configuration File by Using RCP
661
Clearing Configuration Information
663
Clearing the Startup Configuration File
663
Deleting a Stored Configuration File
663
Replacing and Rolling Back Configurations
663
Understanding Configuration Replacement and Rollback
663
Configuration Guidelines
665
Configuring the Configuration Archive
665
Performing a Configuration Replacement or Rollback Operation
666
Working with Software Images
667
Image Location on the Switch
668
Tar File Format of Images on a Server or Cisco.com
668
Copying Image Files by Using TFTP
669
Downloading an Image File by Using TFTP
670
Preparing to Download or Upload an Image File by Using TFTP
670
Uploading an Image File by Using TFTP
670
Copying Image Files by Using FTP
672
Downloading an Image File by Using FTP
673
Preparing to Download or Upload an Image File by Using FTP
673
Uploading an Image File by Using FTP
673
Copying Image Files by Using RCP
677
Downloading an Image File by Using RCP
677
Preparing to Download or Upload an Image File by Using RCP
677
Uploading an Image File by Using RCP
677
Appendix
683
Recommendations for Upgrading a Catalyst 2950 Switch to a Catalyst 2960 Switch
683
Configuration Compatibility Issues
683
A P P E N D I X C Recommendations for Upgrading a Catalyst 2950 Switch to a Catalyst 2960 Switch
684
Configuration Compatibility Issues
684
Feature Behavior Incompatibilities
687
Appendix
689
Unsupported Commands in Cisco IOS Release 12.2(40)SE
689
Access Control Lists
689
Unsupported Global Configuration Commands
689
Unsupported Privileged EXEC Commands
689
Unsupported Route-Map Configuration Commands
689
A P P E N D I X D Unsupported Commands in Cisco IOS Release 12.2(40)SE
690
Boot Loader Commands
690
Debug Commands
690
Embedded Event Manager
690
Unsupported Commands in Applet Configuration Mode
690
Unsupported Global Configuration Commands
690
Unsupported Privileged EXEC Commands
690
Unsupported User EXEC Commands
690
IGMP Snooping Commands
691
Unsupported Global Configuration Commands
691
Interface Commands
691
Unsupported Interface Configuration Commands
691
Unsupported Privileged EXEC Commands
691
MAC Address Commands
691
Unsupported Global Configuration Commands
692
Miscellaneous
692
Unsupported Privileged EXEC Commands
692
Network Address Translation (NAT) Commands
692
Qos
693
Unsupported Global Configuration Command
693
Unsupported Interface Configuration Commands
693
Unsupported Policy-Map Configuration Command
693
Radius
693
Unsupported Global Configuration Commands
693
Snmp
693
Spanning Tree
694
Unsupported Global Configuration Command
694
Unsupported Interface Configuration Command
694
Vlan
694
Unsupported User EXEC Commands
694
Unsupported Vlan-Config Command
694
Vtp
694
Unsupported Privileged EXEC Commands
694
I N D E X
695
Advertisement
Advertisement
Related Products
Cisco WS-C2960G-8TC-L
Cisco WS-C2960S-24TD-L
Cisco WS-C2960S-48LPD-L
Cisco WS-C2950-24
Cisco WS-C2950T-24
Cisco WS-C4003-RF - Catalyst 4003 Switch
Cisco WS-C6503-E-FWM-K9
Cisco WS-C6509-V-E
Cisco WS-C6500-SFM - Switch
Cisco WS-C6504-E - Catalyst Switch
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL